Home
61.
Which one of the following is an example of a computer security incident?
  • A.
    User accesses a secure file
  • B.
    Administrator changes a file’s permission settings
  • C.
    Intruder breaks into a building
  • D.
    Former employee crashes a server
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
A former employee crashing a server is an example of a computer security incident because it is an actual violation of the availability of that system. An intruder breaking into a building may be a security event, but it is not necessarily a computer security event unless he or she performs some action affecting a computer system. A user accessing a secure file and an administrator changing a file permission settings are examples of security events but are not security incidents.
Report
Name Email  
62.
During what phase of the incident response process would an organization implement defenses designed to reduce the likelihood of a security incident?
  • A.
    Preparation
  • B.
    Detection and analysis
  • C.
    Containment, eradication, and recovery
  • D.
    Post-incident activity
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Organizations should build solid, defense-in-depth approaches to cybersecurity during the preparation phase of the incident response process. The controls built during this phase serve to reduce the likelihood and impact of future incidents.
Report
Name Email  
63.
Alan is responsible for developing his organization’s detection and analysis capabilities. He would like to purchase a system that can combine log records from multiple sources to detect potential security incidents. What type of system is best suited to meet Alan’s security objective?
  • A.
    IPS
  • B.
    IDS
  • C.
    SIEM
  • D.
    Firewall
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A security information and event management (SIEM) system correlates log entries from multiple sources and attempts to identify potential security incidents.
Report
Name Email  
64.
Ben is working to classify the functional impact of an incident. The incident has disabled email service for approximately 30 percent of his organization’s staff. How should Ben classify the functional impact of this incident according to the NIST scale?
  • A.
    None
  • B.
    Low
  • C.
    Medium
  • D.
    High
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The definition of a medium functional impact is that the organization has lost the ability to provide a critical service to a subset of system users. That accurately describes the situation that Ben finds himself in. Assigning a low functional impact is only done when the organization can provide all critical services to all users at diminished efficiency. Assigning a high functional impact is only done if a critical service is not available to all users.
Report
Name Email  
65.
What phase of the incident response process would include measures designed to limit the damage caused by an ongoing breach?
  • A.
    Preparation
  • B.
    Detection and analysis
  • C.
    Containment, eradication, and recovery
  • D.
    Post-incident activity
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The containment protocols contained in the containment, eradication, and recovery phases are designed to limit the damage caused by an ongoing security incident.
Report
Name Email