Incident Response and Management Review Questions - 349 Verified Questions

Page 1


Incident Response and Management Review Questions

Course Introduction

This course provides a comprehensive overview of incident response and management, equipping students with the knowledge and skills needed to effectively address and mitigate cybersecurity incidents. It covers the phases of incident response, including preparation, detection, containment, eradication, recovery, and lessons learned. Students will explore best practices for developing incident response plans, roles and responsibilities within response teams, legal and ethical considerations, and communication strategies. Practical exercises and case studies help students apply frameworks and tools used in real-world scenarios, preparing them to respond swiftly to security breaches and minimize organizational impact.

Recommended Textbook

Information Security and IT Risk Management 1st Edition by Manish Agrawal

Available Study Resources on Quizplus

14 Chapters 349 Verified Questions 349 Flashcards

Source URL: https://quizplus.com/study-set/3541

2

Chapter 1: Introduction

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70324

Sample Questions

Q1) Of the measures you can take to improve your personal security, the least important is

A) Spending lot of money

B) Using end-point virus) protection

C) Automating software updates

D) Using appropriate passwords

Answer: A

Q2) Integrity is

A) Protecting information and information systems from unauthorized use

B) Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices

C) Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity

D) Ensuring timely and reliable access to and use of information

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: System Administration

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70325

Sample Questions

Q1) Common functions of Linux System Administration utilities include

A) Automated customer service

B) Automated business processing

C) Automated installation

D) Automated marketing

Answer: C

Q2) Writing the necessary data in the appropriate locations on a computer 's hard drive for running a software program is called

A) Configuration

B) Access control

C) Installation

D) User management

Answer: C

Q3) A cold spare is a

A) Single point of failure

B) Redundant component that can replace a failed component with no downtime

C) Spare components used to replace failed components as quickly as possible

D) Popular component purchased when it is on sale

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: System Administration 2

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70326

Sample Questions

Q1) Vi is a

A) Graphical editor

B) Text editor

C) Game on Linux systems

D) Substitute for MS Word

Answer: B

Q2) When using a shell program, command options also called flags or switches are

A) Debates between users on which command to use

B) Data provided to a command to use as input

C) Single letters of full words that modify the behavior of the command in a pre-determined way

D) Debates among system administrators on which commands to use

Answer: C

Q3) Common shell programs include

A) Bourne shell, C shell, D shell

B) Born shell, C shell, Born again shell

C) Korn shell, Born shell, C shell

D) Bourne shell, C shell, Bourne-again shell

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Basic Information Security Model

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70327

Sample Questions

Q1) Physical controls

A) Use non-technical methods of preventing harm

B) Are the security measures built into the information system itself

C) Perform malicious tasks at the direction of a remote controller

D) Manipulate people into performing desired actions

Q2) A SQL injection vulnerability is an example of a

A) Unrestricted uploads vulnerability

B) Cross-site scripting vulnerability

C) Buffer overflow vulnerability

D) Lack of input validation vulnerability

Q3) The NVD database

A) Describes likely impacts and measures to remove vulnerabilities

B) A list of all known viruses

C) A list of all known information security firms

D) An inventory of known software vulnerabilities

Q4) A lack of input validation vulnerability refers to a situation where

A) Files are accepted as input without verifying their specifications

B) Input from other users is supplied as output to other users

C) A program puts more data into a storage location than it can hold

D) User input is used without confirming its validity

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Asset Identification and Characterization

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70328

Sample Questions

Q1) The parameters used to characterize assets are

A) Asset sensitivity and asset criticality

B) Asset confidentiality and asset restrictions

C) Restricted and unrestricted assets

D) Essential, required and deferrable assets

Q2) Information assets are

A) Software tools needed to accomplish the organization's mission

B) Digitally stored content owned by an individual or organization

C) Employees whose departure could adversely affect the organization

D) Machinery involved in supporting the business

Q3) Required assets are those whose loss of availability

A) Could be tolerated for a short period of time

B) Could be acceptable

C) Is not acceptable even for a short period of time

D) Would cause immediate severe repercussions to the organization

Q4) RFPs, ITNs, ITBs are associated with the

A) Acquiring stage

B) Deployment stage

C) Management stage

D) Planning stage

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Threats and Vulnerabilities

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70329

Sample Questions

Q1) Help desk staff can be a threat due to

A) Abuse of privileges

B) Human errors

C) Lack of training

D) All of the above

Q2) Threat agents are typically classified as

A) External agents, internal agents and partners

B) Essentiality, and deferability

C) Internal auditors and help desk

D) Consultants, cloud service providers and suppliers

Q3) Partner threat agents include

A) Activist groups and competitors

B) Consultants, cloud service providers and suppliers

C) Internal auditors and help desk

D) Competitors, organized groups and former employees

Q4) The goal of agents running a 419 Nigerian scam is to

A) Damage the reputations of end users

B) Damage end user computers

C) Steal money

D) Steal intellectual property

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Encryption Controls

Available Study Resources on Quizplus for this Chatper

24 Verified Questions

24 Flashcards

Source URL: https://quizplus.com/quiz/70330

Sample Questions

Q1) Hash functions are used primarily for

A) Sharing a secret key prior to network transmission

B) Storing data on hard drives

C) Encrypting data during transmission over a network

D) Saving passwords

Q2) In using public key encryption, messages are deciphered using

A) A public key

B) A shared secret key

C) Any key

D) A private key

Q3) The most common technologies used for secure network communication are

A) VPN and SSL

B) AES and DES

C) PKI and RSA

D) Diffusion and confusion

Q4) Hash functions use

A) 2 keys

B) 1 key

C) 0 keys

D) Any of the above, depending upon the specific hash algorithm

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Identity and Access Management

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70331

Sample Questions

Q1) An individual's affiliation with the organization is called their A) Access

B) Role

C) Account

D) Password

Q2) Identity discovery involves

A) Locating all new and updated identities in the organization

B) Comparing each discovered identity to a master record of all individuals in the organization

C) Collecting data about each individual's relationship to the organization

D) Making decisions about granting users access to resources

Q3) Kerberos is

A) The process of proving that a user is the owner of the identity being used

B) A secret series of characters known only to the user

C) The use of minute differences in physical traits to prove identity

D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens

Q4) Kerberos has been very useful in securing web applications

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Hardware and Software Controls

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70332

Sample Questions

Q1) Assessing the safety of a file using scores calculated from its observable attributes is called

A) Reputation based end-point protection

B) Protocol-based end-point protection

C) Anomaly-based end-point protection

D) Signature-based end-point protection

Q2) The merits of firewalls include all the following except A) Costs

B) Complexity

C) Wide availability

D) Vulnerability to poor configuration

Q3) An IDS that compares observed activity with defined patterns is a A) Firewall

B) Signature-based IDS

C) Anomaly-based IDS

D) Protocol-state IDS

Q4) Patches should always be installed as soon as they become available

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Shell Scripting

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70333

Sample Questions

Q1) Consider the following script. The output will be newlines replaced by spaces for brevity): #! /bin/bash counter=1 while [ $counter -le 2] do echo $counter done

Q2) A specific set of commands is to be executed 10 times. The most appropriate loop construct to accomplish this is A) for B) while C) do D) if

To view all questions and flashcards with answers, click on the resource link above.

Page 12

Chapter 11: Incident Handling

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70334

Sample Questions

Q1) Containment is

A) Saving log files in a server container configured specially for this purpose

B) Preventing the expansion of harm

C) Removing the causes of the adverse event

D) Returning systems to owners for normal operations after the incident

Q2) Information about the incident should be disseminated

A) Exhaustively, to all constituents

B) Primarily to end users

C) Primarily to the organization's leadership

D) On a need-to-know basis

Q3) During an incident, the IRT is involved with all of the following, except

A) Identifying the threats to the organization from the incident

B) Mitigating risks

C) Communicating with stakeholders

D) Issuing a final report

Q4) Log consolidation refers to

A) Recording the aggregation of credit cards

B) Checking logs from every system daily

C) Logging the system updates applied to the system

D) Gathering logs from multiple systems onto one system

13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Incident Analysis

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70335

Sample Questions

Q1) Syslog facilities include all of the following except

A) auth

B) cron

C) kern

D) debug

Q2) When investigating an incident on a Unix/ Linux system, generally the first file to be examined is

A) wtmp

B) utmp

C) authlog

D) messages

Q3) Syslog.conf line mail.crit /tmp/messages is interpreted to mean

A) Send all log messages from the mail service to the /tmp/messages file

B) Send critical log messages from the mail service to the /tmp/messages file

C) Send all log messages from the mail service to the /tmp/messages file.

D) Send critical log messages from the mail service to the default log file location

Q4) Cloud storage adds complexity to the work of security administrators

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Policies, Standards and Guidelines

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70336

Sample Questions

Q1) It is generally advised to consolidate all policy issues into one policy document

A)True

B)False

Q2) If an organization specifies that all laptops in the organization will use whole-disk encryption, the specific encryption technology will be specified in a

A) Guideline

B) Standard

C) Policy

D) Law

Q3) Compliance is

A) Procedures that tell units when it would be nice if things were operated a certain way, but it is not a requirement to do so

B) Guidelines to users and customers on what is appropriate and what is not appropriate to do with information technology resources

C) Following specifications put forth by policies or legal requirements

D) A defined set of rules, accepted and adopted by several organizations

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: It Risk Analysis and Risk Management

Available Study Resources on Quizplus for this Chatper

25 Verified Questions

25 Flashcards

Source URL: https://quizplus.com/quiz/70337

Sample Questions

Q1) In the NIST 800-39 framework, risk response

A) Addresses how organizations respond to risks

B) Identifies and aggregates the risks facing the organization

C) Describes the environment in which risk-based decisions are made

D) Evaluates the effectiveness of the organization's risk-management plan

Q2) The motivation for the passage of the Sarbanes-Oxley act was

A) Failure of Internet technologies

B) Denial of culpability by senior executives for falsification of records

C) To prevent stock market crashes

D) To recover retiree savings

Q3) As described in the text, a statement of a risk includes

A) Agent, threat, asset, damage

B) Agent, action, damage, threat

C) Agent, action, asset, damage

D) Threat, asset, action, damage

Q4) Section 906 of the Sarbanes-Oxley act of 2002 specifies

A) Penalties for non-compliance with the law

B) That the signing officer has reviewed financial statements

C) Privacy requirements for healthcare records have been followed

D) That attestations are made in accordance with PCAOB standards

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Incident Response and Management Review Questions - 349 Verified Questions by Quizplus - Issuu