1.
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be categorized as a tangible and intangible cost. Identify the tangible cost associated with virus outbreak?
2.
Which of the following incidents are reported under CAT -5 federal agency category?
3.
One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers security vulnerabilities and by responding effectively to potential information security incidents. Identify the incident response approach that focuses on developing the infrastructure and security processes before the occurrence or detection of an event or any incident:
4.
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large amounts of data using a combination of automated and manual methods. Identify the computer forensic process involved:
5.
Incident management team provides support to all users in the organization that are affected by the threat or attack. The organizations internal auditor is part of the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:
6.
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy that focuses on minimizing the probability of risk and losses by searching for vulnerabilities in the system and appropriate controls:
7.
Based on the some statistics; what is the typical number one top incident?
8.
An adversary attacks the information resources to gain undue advantage is called:
9.
An assault on system security that is derived from an intelligent threat is called:
10.
The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called: