1. A data breach has occurred at a third-party vendor used by an organization to outsource the processing of its customer data. What should be management'sFIRST course of action?
A) Activate the disaster recovery plan B) Notify the insurance company of the potential claim C) Activate the incident management process D) Take legal action against the service provider for reputation damage
2. Which of the following should be performed immediately after a computer security incident has been detected and analyzed by an incident response team?
A) Assess the impact of the incident on critical systems B) Categorize the incident C) Eradicate the component that caused the incident D) Contain the incident before it spreads
3. An advantage of installing a thin client architecture in a local area network (LAN) is that this would:
A) stabilize network bandwidth requirements B) facilitate the updating of software versions C) ensure application availability when the server s down D) reduce the risk of a single point of failure
4. During an external assessment of network vulnerability, which of the following activities should be performed FIRST?
A) Collect network information B) Implement an intrusion detection system (IDS) C) Monitor the network D) Review policies
5. Which of the following provides for the GREATEST cost reduction in a large data center?
A) Server consolidation B) Staff rotation C) Power conditioning D) Job-scheduling software
Leave a comment