Home
66.
Grace is the CSIRT team leader for a business unit within NASA, a federal agency. What is the minimum amount of time that Grace must retain incident handling records?
  • A.
    Six months
  • B.
    One year
  • C.
    Two years
  • D.
    Three years
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
National Archives General Records Schedule (GRS) 24 requires that all federal agencies retain incident handling records for at least three years.
Report
Name Email  
67.
Karen is responding to a security incident that resulted from an intruder stealing files from a government agency. Those files contained unencrypted information about protected critical infrastructure. How should Karen rate the information impact of this loss?
  • A.
    None
  • B.
    Privacy breach
  • C.
    Proprietary breach
  • D.
    Integrity loss
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
In a proprietary breach, unclassified proprietary information is accessed or exfiltrated. Protected critical infrastructure information (PCII) is an example of unclassified proprietary information.
Report
Name Email  
68.
Matt is concerned about the fact that log records from his organization contain conflicting timestamps due to unsynchronized clocks. What protocol can he use to synchronize clocks throughout the enterprise?
  • A.
    NTP
  • B.
    FTP
  • C.
    ARP
  • D.
    SSH
  • Answer & Explanation
  • Report
Answer : [A]
Explanation : The Network Time Protocol (NTP) provides a common source of time information that allows the synchronizing of clocks throughout an enterprise.
Report
Name Email  
69.
Which one of the following document types would outline the authority of a CSIRT responding to a security incident?
  • A.
    Policy
  • B.
    Procedure
  • C.
    Playbook
  • D.
    Baseline
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
An organization’s incident response policy should contain a clear description of the authority assigned to the CSIRT while responding to an active security incident.
Report
Name Email  
70.
A cross-site scripting attack is an example of what type of threat vector?
  • A.
    Impersonation
  • B.
    Email
  • C.
    Attrition
  • D.
    Web
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
A web attack is an attack executed from a website or webbased application—for example, a cross-site scripting attack used to steal credentials or redirect to a site that exploits a browser vulnerability and installs malware.
Report
Name Email