(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests. Mike Chapple
Чтение книги онлайн.
Читать онлайн книгу (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests - Mike Chapple страница 18
29 In what virtualization model do full guest operating systems run on top of a virtualization platform?Virtual machinesSoftware-defined networkingVirtual SANApplication virtualization
30 During what phase of the incident response process would security professionals analyze the process itself to determine whether any improvements are warranted?Lessons learnedRemediationRecoveryReporting
31 Which one of the following information sources is most likely to detect a security incident involving unauthorized modification of information by an employee?Intrusion detection systemAntivirus softwareFile integrity monitoring systemFirewall logs
32 During what phase of incident response is the primary goal to limit the damage caused by an incident?DetectionContainmentEradicationRecovery
33 Darcy is a computer security specialist who is assisting with the prosecution of a hacker. The prosecutor requests that Darcy give testimony in court about whether, in her opinion, the logs and other records in a case are indicative of a hacking attempt. What type of evidence is Darcy being asked to provide?Expert opinionDirect evidenceReal evidenceDocumentary evidence
34 Jerome is conducting a forensic investigation and is reviewing database server logs to investigate query contents for evidence of SQL injection attacks. What type of analysis is he performing?Hardware analysisSoftware analysisNetwork analysisMedia analysis
35 What documentation is typically prepared after a postmortem review of an incident has been completed?A lessons learned documentA risk assessmentA remediation listA mitigation checklist
36 Ed has been tasked with identifying a service that will provide a low-latency, high- performance, and high-availability way to host content for his employer. What type of solution should he seek out to ensure that his employer’s customers around the world can access their content quickly, easily, and reliably?A hot siteA CDNRedundant serversA P2P CDN
37 Who is the ideal person to approve an organization’s business continuity plan?Chief information officerChief executive officerChief information security officerChief operating officer
38 Which one of the following actions is not normally part of the project scope and planning phase of business continuity planning?Structured analysis of the organizationReview of the legal and regulatory landscapeCreation of a BCP teamDocumentation of the plan
39 Henry’s company is being sued for breach of contract. What type of law will cover this?Civil lawAdministrative lawCriminal lawEthical standards
40 The forensic investigation that Joanna has conducted is complete, and the report has been provided to organizational leadership in preparation for a human resources action. What should Joanna do once the report has been provided?Delete all files and notes about the forensic case.Notify the subject of the forensic investigation that it is complete.Notify law enforcement that the forensic investigation is complete.Preserve the forensic materials and notes in case they are needed.
41 Which of the following is not an event that is typically prepared for in an emergency response plan?A supply chain disruptionA pandemicA natural disasterA man-made disaster
42 Miguel is preparing a crisis management process for his organization. What step will typically come after “Respond” in the following cycle?AnalyzeRecoverEvaluateIdentify
43 Emma’s organization is planning for natural disasters and wants to have a backup site available to move operations to. What important factor in backup site selection will help Emma avoid a single disaster disrupting operations for her organization?Network bandwidthAvailability of backup powerGeographic locationRisk of natural disasters for the locations
Конец ознакомительного фрагмента.
Текст предоставлен ООО «ЛитРес».
Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.
Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.