1. The members of an emergency incident response team should be:
A) selected from multiple departments B) assigned at the time of each incident C) restricted to IT personnel D) appointed by the CISO
2. What is the MOST important role of a Certificate Authority (CA) when a private key becomes compromised?
A) Issue a new private key to the user B) Refresh the key information database in the certificate publishing server C) Publish the certificate revocation lists (CRL) into the repository D) Refresh the metadata of the certificates
3. Which of the following is the BEST way to increase the effectiveness of security incident detection?
A) Determining containment activities based on the type of incident B) Establishing service level agreements (SLAs) with appropriate forensic service providers C) Educating end users on identifying suspicious activity D) Documenting root cause analysis procedures
4. Several remote users have been unable to communicate with a secured network news transfer protocol (NNTP) server. Of the following, the MOST likely cause is:
A) the use of a password cracker B) a hacker impersonating the server C) a hacker using a sniffer D) a replay attack by an eavesdropper
5. Which of the following MOST effectively provides assurance of ongoing service delivery by a vendor?
A) Regular status reporting provided by the vendor B) Short incident response time by the vendor C) Pre-defined service and operational level agreements D) Regular monitoring by service management team
Leave a comment