Home
You may like this!
41.
Which is the most volatile memory?
  • A.
    Hard disk/li>
  • B.
    CPU cache
  • C.
    RAM
  • D.
    USB drive
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
CPU cache is the closest memory to the CPU and the most volatile. Options A and D are long-term storage and not referred to as volatile memory. Option C is volatile memory, but it’s not as volatile as CPU cache.
Report
Name Email  
42.
Which option provides the best description of the first action to take during incident response?
  • A.
    Determine the source and vector of the threat.
  • B.
    Follow the procedures in the incident response plan
  • C.
    Disconnect the affected computers
  • D.
    Alert the third-party incident response team.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Always follow the procedures in a plan. Options A, C, and D are incorrect, although they may be included as a procedure in a plan.
Report
Name Email  
43.
Which option most accurately describes continuity of operations after a disaster event?
  • A.
    Controlling risk to the organization
  • B.
    Planned procedures that are performed when a security-related incident occurs
  • C.
    Planned activities that enable the organizations critical business functions to return to operations
  • D.
    Transferring risk to a third-party insurance carrier
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Planned activities that enable the critical business functions to return to normal operations. Some critical business functions may resume operations at a reduced capacity. Option A is incorrect because it describes a function of risk assessment. Option B is incorrect because activities that are performed when a security-related incident occurs are a part of incident response. Option D describes a part of risk treatment.
Report
Name Email  
44.
When considering a disaster which of the following is not a commonly accepted definition?
  • A.
    An occurrence that is outside the normal functional baselines
  • B.
    An occurrence or imminent threat to the enterprise of widespread or severe damage, injury, loss of life, or loss of property
  • C.
    An emergency that is beyond the normal response resources of the enterprise
  • D.
    A suddenly occurring event that has a long-term negative impact on major IT infrastructure
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
This answer is very general and vague. Options B, C, and D are all commonly accepted defi nitions of a disaster.
Report
Name Email  
45.
It should require the ability to respond quickly and effectively to an incident.
  • A.
    It should require the ability to respond quickly and effectively to an incident.
  • B.
    It should require the prevention of future damage from an incident
  • C.
    It should require the retaliation against repeat attackers.
  • D.
    It can require the repair of damage done from an incident.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Retaliation is not an acceptable incident response activity. Options A, B, and D are all part of an organization’s incident handling response policy.
Report
Name Email