40%off
212-89 Premium Bundle
Latest 212-89 Exam Premium Dumps provide by TrainingDump.com to help you Passing 212-89 Exam! TrainingDump.com offers the updated 212-89 exam dumps, the TrainingDump.com 212-89 exam questions has been updated to correct Answer. Get the latest TrainingDump.com 212-89 pdf dumps with Exam Engine here:
(274 Q&As Dumps, 40%OFF Special Discount: DumpsFiles)
Join the discussion
Question 62/77
The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven language, performs real-time traffic analysis and packet logging is known as:
Correct Answer: A
Add Comments
- Other Question (77q)
- Q1. The Linux command used to make binary copies of computer media and as a disk imaging tool ...
- Q2. Contingency planning enables organizations to develop and maintain effective methods to ha...
- Q3. A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated...
- Q4. Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :...
- Q5. What is the best staffing model for an incident response team if current employees' expert...
- Q6. A malicious security-breaking code that is disguised as any useful program that installs a...
- Q7. Which of the following is NOT one of the Computer Forensic types:...
- Q8. Insiders understand corporate business functions. What is the correct sequence of activiti...
- Q9. Agencies do NOT report an information security incident is because of:...
- Q10. The correct order or sequence of the Computer Forensic processes is:...
- Q11. A software application in which advertising banners are displayed while the program is run...
- Q12. A methodical series of techniques and procedures for gathering evidence, from computing eq...
- Q13. A payroll system has a vulnerability that cannot be exploited by current technology. Which...
- Q14. Organizations or incident response teams need to protect the evidence for any future legal...
- Q15. Identify a standard national process which establishes a set of activities, general tasks ...
- Q16. A self-replicating malicious code that does not alter files but resides in active memory a...
- Q17. In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT s...
- Q18. The service organization that provides 24x7 computer security incident response services t...
- Q19. Changing the web server contents, Accessing the workstation using a false ID and Copying s...
- Q20. Incident management team provides support to all users in the organization that are affect...
- Q21. Quantitative risk is the numerical determination of the probability of an adverse event an...
- Q22. A malware code that infects computer files, corrupts or deletes the data in them and requi...
- Q23. The insider risk matrix consists of technical literacy and business process knowledge vect...
- Q24. Incident handling and response steps help you to detect, identify, respond and manage an i...
- Q25. The goal of incident response is to handle the incident in a way that minimizes damage and...
- Q26. Business Continuity provides a planning methodology that allows continuity in business ope...
- Q27. The state of incident response preparedness that enables an organization to maximize its p...
- Q28. Keyloggers do NOT:
- Q29. Contingency planning enables organizations to develop and maintain effective methods to ha...
- Q30. ADAM, an employee from a multinational company, uses his company's accounts to send e-mail...
- Q31. The network perimeter should be configured in such a way that it denies all incoming and o...
- Q32. The Malicious code that is installed on the computer without user's knowledge to acquire i...
- Q33. Insiders understand corporate business functions. What is the correct sequence of activiti...
- Q34. The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a...
- Q35. Computer Forensics is the branch of forensic science in which legal evidence is found in a...
- Q36. In a DDoS attack, attackers first infect multiple systems, which are then used to attack a...
- Q37. Incident Response Plan requires
- Q38. Insider threats can be detected by observing concerning behaviors exhibited by insiders, s...
- Q39. ________________ attach(es) to files
- Q40. An information security policy must be:
- Q41. The data on the affected system must be backed up so that it can be retrieved if it is dam...
- Q42. The left over risk after implementing a control is called:...
- Q43. Which of the following is an incident tracking, reporting and handling tool:...
- Q44. Absorbing minor risks while preparing to respond to major ones is called:...
- Q45. An audit trail policy collects all audit trails such as series of records of computer even...
- Q46. Quantitative risk is the numerical determination of the probability of an adverse event an...
- Q47. Computer forensics is methodical series of techniques and procedures for gathering evidenc...
- Q48. Identify the network security incident where intended authorized users are prevented from ...
- Q49. Any information of probative value that is either stored or transmitted in a digital form ...
- Q50. In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT s...
- Q51. An incident recovery plan is a statement of actions that should be taken before, during or...
- Q52. Incident may be reported using/ by:
- Q53. In a qualitative risk analysis, risk is calculated in terms of:...
- Q54. The process of rebuilding and restoring the computer systems affected by an incident to no...
- Q55. Which is the incorrect statement about Anti-keyloggers scanners:...
- Q56. One of the goals of CSIRT is to manage security problems by taking a certain approach towa...
- Q57. An assault on system security that is derived from an intelligent threat is called:...
- Q58. According to the Evidence Preservation policy, a forensic investigator should make at leas...
- Q59. A Malicious code attack using emails is considered as:...
- Q60. The main feature offered by PGP Desktop Email is:...
- Q61. The typical correct sequence of activities used by CSIRT when handling a case is:...
- Q62. The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a...
- Q63. Preventing the incident from spreading and limiting the scope of the incident is known as:...
- Q64. Incident prioritization must be based on:
- Q65. The USB tool (depicted below) that is connected to male USB Keyboard cable and not detecte...
- Q66. The sign(s) of the presence of malicious code on a host infected by a virus which is deliv...
- Q67. The product of intellect that has commercial value and includes copyrights and trademarks ...
- Q68. Computer forensics is methodical series of techniques and procedures for gathering evidenc...
- Q69. Which of the following is an appropriate flow of the incident recovery steps?...
- Q70. A self-replicating malicious code that does not alter files but resides in active memory a...
- Q71. Business Continuity planning includes other plans such as:...
- Q72. One of the goals of CSIRT is to manage security problems by taking a certain approach towa...
- Q73. Computer viruses are malicious software programs that infect computers and corrupt or dele...
- Q74. A threat source does not present a risk if NO vulnerability that can be exercised for a pa...
- Q75. Lack of forensic readiness may result in:
- Q76. Which of the following is a correct statement about incident management, handling and resp...
- Q77. The sign(s) of the presence of malicious code on a host infected by a virus which is deliv...
