41.
Which is the most volatile memory?
- A.Hard disk/li>
- B.CPU cache
- C.RAM
- D.USB drive
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
CPU cache is the closest memory to the CPU and the most volatile. Options A and D are long-term storage and not referred to as volatile memory. Option C is volatile memory, but it’s not as volatile as CPU cache. |
42.
Which option provides the best description of the first action to take during incident
response?
- A.Determine the source and vector of the threat.
- B.Follow the procedures in the incident response plan
- C.Disconnect the affected computers
- D.Alert the third-party incident response team.
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Always follow the procedures in a plan. Options A, C, and D are incorrect, although they may be included as a procedure in a plan. |
43.
Which option most accurately describes continuity of operations after a disaster event?
- A.Controlling risk to the organization
- B.Planned procedures that are performed when a security-related incident occurs
- C.Planned activities that enable the organizations critical business functions to return to operations
- D.Transferring risk to a third-party insurance carrier
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Planned activities that enable the critical business functions to return to normal operations. Some critical business functions may resume operations at a reduced capacity. Option A is incorrect because it describes a function of risk assessment. Option B is incorrect because activities that are performed when a security-related incident occurs are a part of incident response. Option D describes a part of risk treatment. |
44.
When considering a disaster which of the following is not a commonly accepted
definition?
- A.An occurrence that is outside the normal functional baselines
- B.An occurrence or imminent threat to the enterprise of widespread or severe damage, injury, loss of life, or loss of property
- C.An emergency that is beyond the normal response resources of the enterprise
- D.A suddenly occurring event that has a long-term negative impact on major IT infrastructure
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
This answer is very general and vague. Options B, C, and D are all commonly accepted defi nitions of a disaster. |
45.
It should require the ability to respond quickly and effectively to an incident.
- A.It should require the ability to respond quickly and effectively to an incident.
- B.It should require the prevention of future damage from an incident
- C.It should require the retaliation against repeat attackers.
- D.It can require the repair of damage done from an incident.
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Retaliation is not an acceptable incident response activity. Options A, B, and D are all part of an organization’s incident handling response policy. |