1.
Question 1
Which two (2) key components are part of incident response? (Select 2)
1 / 1 point
Correct
2.
Question 2
Which is not part of the Sans Institutes Audit process?
1 / 1 point
Correct
3.
Question 3
Which key concept to understand incident response is defined as “data inventory, helps to understand the current tech status, data classification, data management, we could use automated systems. Understand how you control data retention and backup.”
1 / 1 point
Correct
4.
Question 4
Which is not included as part of the IT Governance process?
1/ 1 point
Correct
5.
Question 5
Trudy reading Alice’s message to Bob is a violation of which aspect of the CIA Triad?
1 / 1 point
Correct
6.
Question 6
A hash is a mathematical algorithm that helps assure which aspect of the CIA Triad?
1 / 1 point
Correct
7.
Question 7
A successful DOS attack against your company’s servers is a violation of which aspect of the CIA Triad?
1 / 1 point
Correct
8.
Question 8
Which of these is an example of the concept of non-repudiation?
1 / 1 point
Correct
9.
Question 9
You have been asked to establish access to corporate documents in such a way that they can be read from anywhere, but only modified while the employees are in the office. Which 2 access criteria types were likely involved in setting this up?
1 / 1 point
Correct
10.
Question 10
In incident management, an observed change to the normal behavior of a system, environment or process is called what?
1 / 1 point
Correct
11.
Question 11
In incident management, tools like SIEM, SOA and UBA are part of which key concept?
1 / 1 point
Correct
12.
Question 12
Which phase of the Incident Response Process do steps like Carry out a post incident review and Communicate and build on lessons learned fall into?
1 / 1 point
Correct
13.
Question 13
In the context of security standards and compliance, which two (2) of these are considered normative and compliance items?
1 / 1 point
Correct
14.
Question 14
A company document that details how an employee should request Internet access for her computer would be which of the following?
1 / 1 point
Correct
15.
Question 15
Which of these is a methodology by which to conduct audits?
1 / 1 point
Correct
16.
Question 16
Mile 2 CPTE Training teaches you how to do what?
1 / 1 point
Correct
17.
Question 17
Which three (3) statements about OWASP are True?