66.
Grace is the CSIRT team leader for a business unit within
NASA, a federal agency. What is the minimum amount of time
that Grace must retain incident handling records?
- A.Six months
- B.One year
- C.Two years
- D.Three years
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
National Archives General Records Schedule (GRS) 24 requires that all federal agencies retain incident handling records for at least three years. |
67.
Karen is responding to a security incident that resulted from
an intruder stealing files from a government agency. Those files
contained unencrypted information about protected critical
infrastructure. How should Karen rate the information impact
of this loss?
- A.None
- B.Privacy breach
- C.Proprietary breach
- D.Integrity loss
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
In a proprietary breach, unclassified proprietary information is accessed or exfiltrated. Protected critical infrastructure information (PCII) is an example of unclassified proprietary information. |
68.
Matt is concerned about the fact that log records from his
organization contain conflicting timestamps due to
unsynchronized clocks. What protocol can he use to
synchronize clocks throughout the enterprise?
- A.NTP
- B.FTP
- C.ARP
- D.SSH
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
69.
Which one of the following document types would outline
the authority of a CSIRT responding to a security incident?
- A.Policy
- B.Procedure
- C.Playbook
- D.Baseline
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
An organization’s incident response policy should contain a clear description of the authority assigned to the CSIRT while responding to an active security incident. |
70.
A cross-site scripting attack is an example of what type of
threat vector?
- A.Impersonation
- B.Email
- C.Attrition
- D.Web
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A web attack is an attack executed from a website or webbased application—for example, a cross-site scripting attack used to steal credentials or redirect to a site that exploits a browser vulnerability and installs malware. |