New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A organization's security system which involves in preventing, detecting, analyzing, and responding to cybersecurity incidents.

A.

Business continuity team

B.

Disaster recovery team

C.

Incident response team

D.

Security operations center

A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario

A.

Maintaining critical business functions during the disruption

B.

Fixing the hardware failure

C.

Restoring IT and communications back to full operations after the disruptions

D.

Guiding the actions of emergency response personnel during the disruption

Which one of the following controls is not particularly effective against the insider threat?

A.

Least privilege

B.

Background checks

C.

Firewalls

D.

Separation of duties

What is the purpose of defense in depth in information security

A.

To Implement only technical controls to prevent a cyber attack

B.

To provide unrestricted access to organization assets

C.

To establish variable barriers across multiple layers and mission of the organization

D.

To guarantee that a cyber attack will not occur

An employee unintentionally shares confidential information with an unauthorized party. What term best describes this situation?

A.

Event

B.

Exploit

C.

Intrusion

D.

Breach

A company wants to ensure that its employees can evacuate the building in case of an emergency which physical control is best suited for this scenario

A.

Fire Alarms

B.

Exit signs

C.

Emergency lighting

D.

Emergency exit doors

COVID-19 is one of the perfect example of a situation, where a________plan is

enacted to sustain the business

A.

IRP

B.

DRP

C.

BCP

D.

ALL

An IP network protocol standardized by the Internet Engineering Task Force (IETF) through RFC 792 to determine if a particular service or host is available.

A.

IP

B.

ICMP

C.

IGMP

D.

HTTP

A common network device used to filter traffic?

A.

Server

B.

Endpoint

C.

Ethernet

D.

Firewa

What is the importance of non-repudiation in todays world of ecommerce

A.

It ensures that people are not held responsible for transaction that did not conduct

B.

It ensures that people are held responsible for transactions they conducted

C.

It ensures that transactions are not conducted online

D.

It ensures that transactions are conducted online