Which key concept to understand incident response is defined as “data inventory, helps to understand the current tech status, data classification, data management, we could use automated systems. Understand how you control data retention and backup.”

1.

Question 1

Which two (2) key components are part of incident response? (Select 2)

1 / 1 point

Correct

2.

Question 2

Which is not part of the Sans Institutes Audit process?

1 / 1 point

Correct

3.

Question 3

Which key concept to understand incident response is defined as “data inventory, helps to understand the current tech status, data classification, data management, we could use automated systems. Understand how you control data retention and backup.”

1 / 1 point

Correct

4.

Question 4

Which is not included as part of the IT Governance process?

1/ 1 point

Correct

5.

Question 5

Trudy reading Alice’s message to Bob is a violation of which aspect of the CIA Triad?

1 / 1 point

Correct

6.

Question 6

A hash is a mathematical algorithm that helps assure which aspect of the CIA Triad?

1 / 1 point

Correct

7.

Question 7

A successful DOS attack against your company’s servers is a violation of which aspect of the CIA Triad?

1 / 1 point

Correct

8.

Question 8

Which of these is an example of the concept of non-repudiation?

1 / 1 point

Correct

9.

Question 9

You have been asked to establish access to corporate documents in such a way that they can be read from anywhere, but only modified while the employees are in the office. Which 2 access criteria types were likely involved in setting this up?

1 / 1 point

Correct

10.

Question 10

In incident management, an observed change to the normal behavior of a system, environment or process is called what?

1 / 1 point

Correct

11.

Question 11

In incident management, tools like SIEM, SOA and UBA are part of which key concept?

1 / 1 point

Correct

12.

Question 12

Which phase of the Incident Response Process do steps like Carry out a post incident review and Communicate and build on lessons learned fall into?

1 / 1 point

Correct

13.

Question 13

In the context of security standards and compliance, which two (2) of these are considered normative and compliance items?

1 / 1 point

Correct

14.

Question 14

A company document that details how an employee should request Internet access for her computer would be which of the following?

1 / 1 point

Correct

15.

Question 15

Which of these is a methodology by which to conduct audits?

1 / 1 point

Correct

16.

Question 16

Mile 2 CPTE Training teaches you how to do what?

1 / 1 point

Correct

17.

Question 17

Which three (3) statements about OWASP are True?

Click here to order similar paper @Udessaywriters.com.100% Original.Written from scratch by professional writers.

You May Also Like

About the Author: admin