1. Which of the following is a MAIN security challenge when conducting a post-incident review related to bring your own device (BYOD) in a mature, diverse organization?
A) Ability to obtain possession of device B) Lack of mobile forensics expertise C) Diversity of operating systems D) Ability to access device remotely
2. Which of the following helps to ensure that the appropriate resources are applied in a timely manner after an incident has occurred?
A) Initiate an incident management log. B) Define incident response teams. C) Broadcast an emergency message. D) Classify the incident.
3. The MOST important reason to use a centralized mechanism to identify information security incidents is to:
A) comply with corporate policies. B) prevent unauthorized changes to networks. C) threats across environments. D) detect potential fraud.
4. After a server has been attacked, which of the following is the BEST course of action?
A) Conduct a security audit B) Review vulnerability assessment C) Isolate the system D) Initiate incident response
5. An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
A) Disable remote access B) Initiate a device reset C) Initiate incident response D) Conduct a risk assessment
Leave a comment