Join the discussion
Question 1/125
An adversary attacks the information resources to gain undue advantage is called:
Correct Answer: C
Add Comments
- Other Question (125q)
- Q1. An adversary attacks the information resources to gain undue advantage is called:...
- Q2. Which of the following may be considered as insider threat(s):...
- Q3. Which of the following is not a best practice to eliminate the possibility of insider atta...
- Q4. Which of the following is not the responsibility of first responders?...
- Q5. Browser data can be used to access various credentials. Which of the following tools is us...
- Q6. The main difference between viruses and worms is:...
- Q7. An attacker after performing an attack decided to wipe evidences using artifact wiping tec...
- Q8. Which of the following is NOT a network forensic tool?...
- Q9. The state of incident response preparedness that enables an organization to maximize its p...
- Q10. Which of the following is not a best practice to eliminate the possibility of insider atta...
- Q11. Bran is an incident handler who is assessing the network of the organization. He wants to ...
- Q12. The correct order or sequence of the Computer Forensic processes is:...
- Q13. Andrew, an incident responder, is performing risk assessment of the client organization. A...
- Q14. Which of the following is host-based evidence?...
- Q15. Which of the following risk management processes identifies the risks, estimates the impac...
- Q16. Which of the following information security personnel handles incidents from management an...
- Q17. Except for some common roles, the roles in an IRT are distinct for every organization. Whi...
- Q18. Eric works as a system administrator at ABC organization and previously granted several us...
- Q19. Identify Sarbanes-Oxley Act (SOX) Title, which consists of only one section, that includes...
- Q20. Policies are designed to protect the organizational resources on the network by establishi...
- Q21. They type of attack that prevents the authorized users to access networks, systems, or app...
- Q22. The region where the CSIRT is bound to serve and what does it and give service to is known...
- Q23. When an employee is terminated from his or her job, what should be the next immediate step...
- Q24. If the browser does not expire the session when the user fails to logout properly, which o...
- Q25. Which of the following tools helps incident responders effectively contain a potential clo...
- Q26. You area systems administrator for a company. You are accessing your fileserver remotely f...
- Q27. You are talking to a colleague who Is deciding what information they should include in the...
- Q28. Khai was tasked with examining the logs from a Linux email server. The server uses Sendmai...
- Q29. Alice is an incident handler and she has been informed by her lead that the data on affect...
- Q30. Which one of the following is the correct flow of the stages in an incident handling and r...
- Q31. Stanley works as an incident responder at a top MNC based in Singapore. He was asked to in...
- Q32. Which of the following is not called volatile data?...
- Q33. The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility stan...
- Q34. A malicious, security-breaking program is disguised as a useful program. Such executable p...
- Q35. ZYX company experienced a DoS/DDoS attack on their network. Upon investigating the inciden...
- Q36. Dash wants to perform a DoS attack over 256 target URLs simultaneously. Which of the follo...
- Q37. Jacobi san employee at a firm called Dolphin Investment. While he was on duty, he identifi...
- Q38. Dan is a newly appointed information security professional in a renowned organization. He ...
- Q39. Digital evidence must:
- Q40. James has been appointed as an incident handling and response (IH&R) team lead and he ...
- Q41. Which of the following is a volatile evidence collecting tool?...
- Q42. Smith employs various malware detection techniques to thoroughly examine the network and i...
- Q43. A self-replicating malicious code that does not alter files but resides in active memory a...
- Q44. In which of the following phases of incident handling and response (IH&R) process the ...
- Q45. An organization's customers are experiencing either slower network communication or unavai...
- Q46. After a recent email attack, Harry is analyzing the incident to obtain important informati...
- Q47. Which of the following risk mitigation strategies involves execution of controls to reduce...
- Q48. Which of the following is a standard framework that provides recommendations for implement...
- Q49. A software application in which advertising banners are displayed while the program is run...
- Q50. US-CERT and Federal civilian agencies use the reporting timeframe criteria in the federal ...
- Q51. The policy that defines which set of events needs to be logged in order to capture and rev...
- Q52. ___________________ record(s) user's typing.
- Q53. Which of the following is an attack that occurs when a malicious program causes a user's b...
- Q54. Raven is a part of an IH&R team and was info med by her manager to handle and lead the...
- Q55. Rose is an incident-handling person and she is responsible for detecting and eliminating a...
- Q56. Elizabeth, working for OBC organization as an incident responder, is assessing the risks f...
- Q57. Which of the following encoding techniques replaces unusual ASCII characters with "%" foll...
- Q58. A malicious security-breaking code that is disguised as any useful program that installs a...
- Q59. Your manager hands you several items of digital evidence and asks you to investigate them ...
- Q60. Attackers or insiders create a backdoor into a trusted network by installing an unsecured ...
- Q61. Finnis working in the eradication phase, wherein he is eliminating the root cause of an in...
- Q62. Otis is an incident handler working in the Delmont organization. Recently, the organizatio...
- Q63. Adam is an incident handler who intends to use DBCC LOG command to analyze a database and ...
- Q64. Which of the following port scanning techniques involves resetting the TCP connection betw...
- Q65. Alex is an incident handler in QWERTY Company. He identified that an attacker created a ba...
- Q66. Alexis works as an incident responder at XYZ organization. She was asked to identify and a...
- Q67. Jason is an incident handler dealing with malware incidents. He was asked to perform memor...
- Q68. Which of the following is the BEST method to prevent email incidents?...
- Q69. Your company sells SaaS, and your company itself is hosted in the cloud (using it as a Paa...
- Q70. Incident handling and response steps help you to detect, identify, respond and manage an i...
- Q71. What command does a Digital Forensic Examiner use to display the list of all open ports an...
- Q72. Which of the following is a common tool used to help detect malicious internal or compromi...
- Q73. What is correct about Quantitative Risk Analysis:...
- Q74. According to US-CERT; if an agency is unable to successfully mitigate a DOS attack it must...
- Q75. Which of the following is not a countermeasure to eradicate cloud security incidents?...
- Q76. Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack th...
- Q77. The message that is received and requires an urgent action and it prompts the recipient to...
- Q78. A threat source does not present a risk if NO vulnerability that can be exercised for a pa...
- Q79. Which of the following is an attack that attempts to prevent the use of systems, networks,...
- Q80. An insider threat response plan helps an organization minimize the damage caused by malici...
- Q81. During the vulnerability assessment phase, the incident responders perform various steps a...
- Q82. Which of the following is the ECIH phase that involves removing or eliminating the root ca...
- Q83. Which of the following risk mitigation strategies involves execution of controls to reduce...
- Q84. Which of the following is not a countermeasure to eradicate cloud security incidents?...
- Q85. Authorized users with privileged access who misuse the corporate informational assets and ...
- Q86. Insiders may be:
- Q87. Which stage of the incident response and handling process involves auditing the system and...
- Q88. Which of the following are malicious software programs that infect computers and corrupt o...
- Q89. An information security policy must be:
- Q90. Who is mainly responsible for providing proper network services and handling network-relat...
- Q91. In which of the following stages of the incident handling and response (IH&R) process ...
- Q92. Francis received a spoof email asking for his bank information. He decided to use a tool t...
- Q93. A threat source does not present a risk if NO vulnerability that can be exercised for a pa...
- Q94. Malicious downloads that result from malicious office documents being manipulated are caus...
- Q95. Clark, a professional hacker, exploited the web application of a target organization by ta...
- Q96. Joseph is an incident handling and response (IH&R) team lead in Toro Network Solutions...
- Q97. Which of the following digital evidence temporarily stored on a digital device that requir...
- Q98. An estimation of the expected losses after an incident helps organization in prioritizing ...
- Q99. Which of the following port scanning techniques involves resetting the TCP connection betw...
- Q100. In the cloud environment, an authorized security professional executes approved sanitation...
- Q101. The data on the affected system must be backed up so that it can be retrieved if it is dam...
- Q102. Elizabeth, who works for OBC organization as an incident responder, is assessing the risks...
- Q103. Bonney's system has been compromised by a gruesome malware. What is the primary step that ...
- Q104. A colleague wants to minimize their security responsibility because they are in a small or...
- Q105. Chandler is a professional hacker who is targeting an organization called Technote. He wan...
- Q106. Shally, an incident handler, is working for a company named Texas Pvt. Ltd. based in Flori...
- Q107. If a hacker cannot find any other way to attack an organization, they can influence an emp...
- Q108. James is a professional hacker and is employed by an organization to exploit their cloud s...
- Q109. Incidents such as DDoS that should be handled immediately may be considered as:...
- Q110. ________________ attach(es) to files
- Q111. Computer Forensics is the branch of forensic science in which legal evidence is found in a...
- Q112. US-CERT and Federal civilian agencies use the reporting timeframe criteria in the federal ...
- Q113. Francis is an incident handler and security expert. He works at Morison Tech Solutions bas...
- Q114. In which of the following phases of the incident handling and response (IH&R) process ...
- Q115. Which of the following terms may be defined as "a measure of possible inability to achieve...
- Q116. Based on the some statistics; what is the typical number one top incident?...
- Q117. Stanley works as an incident responder at a top MNC based out of Singapore. He was asked t...
- Q118. Identify the malicious program that is masked as a genuine harmless program and gives the ...
- Q119. Alice is an incident handler and she has been informed by her lead that the data on affect...
- Q120. Which of the following information security personnel handles incidents from management an...
- Q121. The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility stan...
- Q122. Network Ned is the security administrator for a company. He is going to place the company'...
- Q123. Finn is working in the eradication phase, wherein he is eliminating the root cause of an i...
- Q124. Which of the following is not the responsibility of first responders?...
- Q125. QualTech Solutions is a leading security services enterprise. Dickson works as an incident...
