<< Prev Question Next Question >>

Question 2/109

The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (109q)
Question 1: Which of the following BCP teams deals with the key decision...
Question 2: The Incident handling process implemented in an enterprise i...
Question 3: Which of the following roles is responsible for review and r...
Question 4: A project plan includes the Work Breakdown Structure (WBS) a...
Question 5: Which of the following types of control gives an instance of...
Question 6: Which of the following defines the communication link betwee...
Question 7: Organizations must assess the safety of their workplaces and...
Question 8: You are an Incident manager in Orangesect.Inc. You have been...
Question 9: Which of the following sources is the best for developing Re...
Question 10: Which of the following documents is necessary to continue th...
Question 11: Which of the following refers to the ability to ensure that ...
Question 12: Which of the following concepts represent the three fundamen...
Question 13: Which of the following tests ensures that the organization c...
Question 14: Which of the following procedures can be broadly defined as ...
Question 15: You work as the project manager for Bluewell Inc. Your proje...
Question 16: Against which of the following does SSH provide protection? ...
Question 17: Which of the following measurements of a disaster recovery p...
Question 18: Which of the following BCP teams handles financial arrangeme...
Question 19: SIMULATION Fill in the blank with the appropriate phrase. __...
Question 20: Which of the following backup sites is a replica of the orig...
Question 21: Which of the following processes helps the business units to...
Question 22: Which of the following methods is a means of ensuring that s...
Question 23: Which of the following backup sites takes the longest recove...
Question 24: Mark works as a Network Administrator for NetTech Inc. Mark ...
Question 25: Which of the following ensures that the confidentiality, int...
Question 26: Which of the following subphases are defined in the maintena...
Question 27: Which of the following is the phase of Incident handling pro...
Question 28: Which of the following command line tools are available in H...
Question 29: Which of the following plans provides procedures for recover...
Question 30: Which of the following is a set of exclusive rights granted ...
Question 31: Which of the following procedures is designed to contain dat...
Question 32: Which of the following elements of BCP process includes the ...
Question 33: Which of the following sets of incident response practices i...
Question 34: Pete works as a Network Security Officer for Gentech Inc. He...
Question 35: You work as a CSO (Chief Security Officer) for Tech Perfect ...
Question 36: You want to use PGP files for steganography. Which of the fo...
Question 37: You are the project manager for a construction project. The ...
Question 38: Which of the following documents helps disaster recovery tea...
Question 39: Which of the following cryptographic system services ensures...
Question 40: Which of the following contract types is described in the st...
Question 41: Which of the following is the simulation of the disaster rec...
Question 42: Software Development Life Cycle (SDLC) is a logical process ...
Question 43: Which of the following measurements of a disaster recovery p...
Question 44: Joseph is a merchant. He lives in an area that is prone to n...
Question 45: BS 7799 is an internationally recognized ISM standard that p...
Question 46: Which of the following procedures is to reduce the risk to p...
Question 47: Which of the following parts of BS 7799 covers risk analysis...
Question 48: Which methodology is a method to analyze the involved tasks ...
Question 49: Which of the following tests activates the total disaster re...
Question 50: Which of the following strategies is used to minimize the ef...
Question 51: Which of the following governance bodies provides management...
Question 52: Which of the following disaster recovery tests includes the ...
Question 53: Which of the following authorizes and documents all the chan...
Question 54: Which of the following processes hides one set of IP address...
Question 55: SIMULATION Fill in the blank with the appropriate phrase. __...
Question 56: Which of the following are some of the parts of a project pl...
Question 57: Which of the following should the administrator ensure durin...
Question 58: Which of the following stages of the business continuity pla...
Question 59: IT Service Continuity Management (ITSCM) is used to support ...
Question 60: Which of the following options is an intellectual property r...
Question 61: Which of the following scripts is included as a part of disa...
Question 62: SIMULATION Fill in the blank: A ______ plan is a plan devise...
Question 63: DRAG DROP Disaster recovery plan consists of various tiers f...
Question 64: Which of the following are common applications that help in ...
Question 65: Which of the following cryptographic system services proves ...
Question 66: Which of the following functions is performed by change cont...
Question 67: Which of the following RAID levels provides fault tolerance?...
Question 68: Which of the following types of agreement can be a legally b...
Question 69: Which of the following procedures is designed to enable secu...
Question 70: Which of the following processes is required for effective b...
Question 71: An organization monitors the hard disks of its employees' co...
Question 72: Which of the following options is an activity of observing t...
Question 73: ISO 17799 has two parts. The first part is an implementation...
Question 74: You work as a project manager for BlueWell Inc. You are work...
Question 75: Which of the following statements are true about classless r...
Question 76: Which of the following statements about a certification auth...
Question 77: DRAG DROP Drag and drop the appropriate team names in front ...
Question 78: Which of the following plans is documented and organized for...
Question 79: Peter works as a Technical Representative in a CSIRT for Sec...
Question 80: Which of the following statements is related to residual ris...
Question 81: You work as a senior project manager in SoftTech Inc. You ar...
Question 82: Which of the following best describes the identification, an...
Question 83: Availability Management deals with the day-to-day availabili...
Question 84: Which of the following workforces works to handle the incide...
Question 85: Which of the following actions can be performed by using the...
Question 86: Which of the following BCP teams assesses the damage of the ...
Question 87: Which of the following levels of RAID provides security feat...
Question 88: Which of the following is established during the Business Im...
Question 89: Configuration Management (CM) is an Information Technology I...
Question 90: A Web-based credit card company had collected financial and ...
Question 91: DRAG DROP Choose the steps involved in the general disaster ...
Question 92: Which of the following control measures are considered while...
Question 93: Which of the following policies is related to the backup of ...
Question 94: Which of the following documents provides a high-level view ...
Question 95: You are working as a project manager in your organization. Y...
Question 96: Which of the following types of controls focuses on stopping...
Question 97: SIMULATION Fill in the blank: An ___________________ (AS) is...
Question 98: SIMULATION Fill in the blank with an appropriate phrase. The...
Question 99: You work as a security manager for SoftTech Inc. You along w...
Question 100: You work as a Network administrator for Infonet Inc. The com...
Question 101: Which of the following plans is designed to protect critical...
Question 102: SIMULATION Fill the appropriate power supply form factor in ...
Question 103: You are analyzing accounting information of a company. Which...
Question 104: Which of the following features of the Cisco MDS 9000 SAN Ex...
Question 105: John, a novice web user, makes a new e-mail account and keep...
Question 106: Which of the following processes identifies the threats that...
Question 107: Which of the following backup sites is the best way for rapi...
Question 108: Which of the following is a category of an automated Inciden...
Question 109: Allen works as a professional Computer Hacking Forensic Inve...