1.
Which of the following is the BEST reason to have a formal and exercised incident management plan?
2.
Which of the following identifies certificates that have been compromised or suspected of being compromised?
3.
Which of the following time periods is a best practice for requiring user awareness training?
4.
In which of the following locations would Sara, a forensic analyst, look to find a hooked process?
5.
A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system.
Which of the following would the company transfer to an insurance company?
6.
Which of the following can be utilized in order to provide temporary IT support during a disaster, where the organization sets aside funds for contingencies, but
does not necessarily have a dedicated site to restore those services?
7.
Which of the following, when used on a file, creates a non-reversible numeric representation of the file's composition?
8.
Banning of personally owned electronic devices at work BEST strengthens which of the following security principles?
9.
Pete, the Chief Security Officer (CSO), is concerned about misuse of company assets and wishes to determine who may be responsible. Which of the following
would be the BEST course of action?
10.
Jane, a user, has attempted to enter her username and password three times unsuccessfully. Jane receives a message to try again in one hour. This is an
example of which of the following?