1. Which of the following is the MOST important reason to consider the role of the IT service disk when developing incident handling procedures?
A) Service desk personnel have information on how to resolve common systems issues. B) The service desk provides a source for the identification of security incidents. C) The service desk provides information to prioritize systems recovery based on user. D) Untrained service desk personnel may be a cause of security incidents.
2. A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
A) Wipe the device remotely. B) Remove user's access to corporate data. C) Prevent the user from using personal mobile devices. D) Report the incident to the police.
3. Which of the following is the PRIMARY responsibility of the designated spokesperson during incident response testing?
A) Communicating the severity of the incident to the board B) Establishing communication channels throughout the organization C) Evaluating the effectiveness of the communication processes D) Acknowledging communications from the incident response team
4. Which of the following BEST contributes to the successful management of security incidents?
A) Established procedures B) Established policies C) Tested controls D) Current technologies
5. After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
A) Calculating cost of the incident B) Conducting a postmortem assessment C) Preserving the evidence D) Performing am impact analysis
Leave a comment