Tough Questions 221-230

  1. Which of the following would security personnel do during the remediation stage of an incident response?
     
    (a) Contain the incident
    (b) Collect evidence
    (c) Rebuild system
    (d) Root cause analysis
     
    Answer:
    (d)
     
    Explanation:
    Security personnel perform a root cause analysis during the remediation stage. A root cause analysis attempts to discover the source of the problem. After discovering the cause, the review will often identify a solution to help prevent a similar occurrence in the future. Containing the incident & collecting evidence is done early in the incident response process. Rebuilding a system may occur during the recovery stage.
     
  2. Of the following choices, which is the most common method of distributing malware?
     
    (a) Drive-by downloads
    (b) USB flash drives
    (c) Ransomware
    (d) Unapproved software
     
    Answer:
    (a)
     
  3. Of the following choices, what is the best form of malware protection?
     
    (a) Multiple solutions on each system
    (b) A single solution throughout the organisation
    (c) Anti-malware protection at several locations
    (d) 100% content filtering at all border gateways
     
    Answer:
    (c)
     
  4.  According to FEMA, approximately what percentage of US states is rated with at least a moderate risk of seismic activity?
     
    (a) 20%
    (b) 40%
    (c) 60%
    (d) 80%
     
    Answer:
    (d)
     
    Explanation:
    41 of the 50 US states are considered to have a moderate, high or very high risk of seismic activity. This rounds to 80%.
     
  5. In which one of the following database recovery techniques is an exact, up-to-date copy of the database maintained at an alternative location?
     
    (a) Transaction logging
    (b) Remote journalling
    (c) Electronic vaulting
    (d) Remote mirroring
     
    Answer:
    (d)
     
    Explanation:
    When you use remote mirroring, an exact copy of the DB is maintained at an alternative location. You keep the remote copy up-to-date by executing all transactions on both the primary and remote site at the same time.
     
  6. What is the the typical time estimate to activate a warm site from the time a disaster is declared?
     
    (a) 1 hour
    (b) 6 hours
    (c) 12 hours
    (d) 24 hours
     
    Answer:
    (c)
     
  7. What type of database backup strategy involves maintenance of a live backup server at the remote site?
     
    (a) Transaction logging
    (b) Remote journalling
    (c) Electronic vaulting
    (d) Remote mirroring
     
    Answer:
    (d)
     
    Explanation:
    Remote mirroring is the only backup option in which a live backup server at a remote site maintains a bit-for-bit copy of the contents of the primary server, synchronised as closely as the latency in the link between primary & remote systems will allow.
     
  8. What is the end goal of DR planning?
     
    (a) Preventing business interruptions
    (b) Setting up temporary business operations
    (c) Restoring normal business activity
    (d) Minimising the impact of a disaster
     
    Answer:
    (c)
     
    Explanation:
    Once a disaster interrupts business operations, the goal of DRP is to restore regular business activity as quickly as possible. Thus, DR planning picks up where BC planning leaves off.
     
  9. Hacktivists are motivated by which of the following factors? (Choose all that apply)
     
    (a) Financial gain
    (b) Thrill
    (c) Skill
    (d) Political beliefs
     
    Answer:
    (b), (d)
     
  10. What phase of the Electronic Discovery Reference Model examines information to remove informaition subject to attorney-client privilege?
     
    (a) Identification
    (b) Collection
    (c) Processing
    (d) Review
     
    Answer:
    (d)

Leave a comment

Design a site like this with WordPress.com
Get started