Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Crackers today are MOST often motivated by their desire to:

A.

Help the community in securing their networks.

B.

Seeing how far their skills will take them.

C.

Getting recognition for their actions.

D.

Gaining Money or Financial Gains.

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

A.

Stealth viruses

B.

Polymorphic viruses

C.

Trojan horses

D.

Logic bombs

Which of the following computer crime is MORE often associated with INSIDERS?

A.

IP spoofing

B.

Password sniffing

C.

Data diddling

D.

Denial of service (DOS)

Java is not:

A.

Object-oriented.

B.

Distributed.

C.

Architecture Specific.

D.

Multithreaded.

The first step in the implementation of the contingency plan is to perform:

A.

A firmware backup

B.

A data backup

C.

An operating systems software backup

D.

An application software backup

Which of the following cannot be undertaken in conjunction or while computer incident handling is ongoing?

A.

System development activity

B.

Help-desk function

C.

System Imaging

D.

Risk management process

To understand the 'whys' in crime, many times it is necessary to understand MOM. Which of the following is not a component of MOM?

A.

Opportunities

B.

Methods

C.

Motivation

D.

Means

A business continuity plan is an example of which of the following?

A.

Corrective control

B.

Detective control

C.

Preventive control

D.

Compensating control

After a company is out of an emergency state, what should be moved back to the original site first?

A.

Executives

B.

Least critical components

C.

IT support staff

D.

Most critical components

During the testing of the business continuity plan (BCP), which of the following methods of results analysis provides the BEST assurance that the plan is workable?

A.

Measurement of accuracy

B.

Elapsed time for completion of critical tasks

C.

Quantitatively measuring the results of the test

D.

Evaluation of the observed test results

Within the legal domain what rule is concerned with the legality of how the evidence was gathered ?

A.

Exclusionary rule

B.

Best evidence rule

C.

Hearsay rule

D.

Investigation rule

Out of the steps listed below, which one is not one of the steps conducted during the Business Impact Analysis (BIA)?

A.

Alternate site selection

B.

Create data-gathering techniques

C.

Identify the company’s critical business functions

D.

Select individuals to interview for data gathering

A momentary power outage is a:

A.

spike

B.

blackout

C.

surge

D.

fault

Under the principle of culpable negligence, executives can be held liable for losses that result from computer system breaches if:

A.

The company is not a multi-national company.

B.

They have not exercised due care protecting computing resources.

C.

They have failed to properly insure computer resources against loss.

D.

The company does not prosecute the hacker that caused the breach.

Recovery Site Strategies for the technology environment depend on how much downtime an organization can tolerate before the recovery must be completed. What would you call a strategy where the alternate site is internal, standby ready, with all the technology and equipment necessary to run the applications?

A.

External Hot site

B.

Warm Site

C.

Internal Hot Site

D.

Dual Data Center

What is the MOST critical piece to disaster recovery and continuity planning?

A.

Security policy

B.

Management support

C.

Availability of backup information processing facilities

D.

Staff training

Which of the following statements pertaining to disaster recovery planning is incorrect?

A.

Every organization must have a disaster recovery plan

B.

A disaster recovery plan contains actions to be taken before, during and after a disruptive event.

C.

The major goal of disaster recovery planning is to provide an organized way to make decisions if a disruptive event occurs.

D.

A disaster recovery plan should cover return from alternate facilities to primary facilities.

The scope and focus of the Business continuity plan development depends most on:

A.

Directives of Senior Management

B.

Business Impact Analysis (BIA)

C.

Scope and Plan Initiation

D.

Skills of BCP committee

Which backup method is additive because the time and tape space required for each night's backup grows during the week as it copies the day's changed files and the previous days' changed files up to the last full backup?

A.

differential backup method

B.

full backup method

C.

incremental backup method

D.

tape backup method.

What is called the probability that a threat to an information system will materialize?

A.

Threat

B.

Risk

C.

Vulnerability

D.

Hole