1.
Which of the following workforces works to handle the incidents in an enterprise?
2.
Which of the following sets of incident response practices is recommended by the CERT/CC?
3.
Which of the following processes helps the business units to understand the impact of a disruptive event?
4.
Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?
5.
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
6.
Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?
7.
Which of the following types of controls focuses on stopping a security breach from taking place in the ?rst place?
8.
Which of the following types of control gives an instance of the audit log?
9.
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
10.
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?