1.
Which of the following is the BEST way to verify that all critical production servers are utilizing up-to- date virus signature files?
2.
Which of the following is the MOST serious exposure of automatically updating virus signature files on every desktop each Friday at 11:00 p.m. (23.00 hrs.)?
3.
Which of the following is MOST closely associated with a business continuity program?
4.
A computer incident response team (CIRT) manual should PRIMARILY contain which of the following documents?
5.
When properly tested, which of the following would MOST effectively support an information security manager in handling a security breach?
6.
Isolation and containment measures for a compromised computer has been taken and information security management is now investigating. What is the MOST appropriate next step?
7.
Why is "slack space" of value to an information security manager as pan of an incident investigation?
8.
What is the PRIMARY objective of a post-event review in incident response?
9.
Detailed business continuity plans should be based PRIMARILY on:
10.
Evidence from a compromised server has to be acquired for a forensic investigation. What would be the BEST source?