1.
When a possible intrusion into your organization's information system has been detected, which of the following actions should be performed first?
2.
When first analyzing an intrusion that has just been detected and confirming that it is a true positive, which of the following actions should be done as a first step if you wish to prosecute the attacker in court?
3.
In order to be able to successfully prosecute an intruder:
4.
What does "System Integrity" mean?
5.
In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.
6.
The security of a computer application is MOST effective and economical in which of the following cases?
7.
Which of the following virus types changes some of its characteristics as it spreads?
8.
Which of the following is commonly used for retrofitting multilevel security to a database management system?
9.
Which of the following is an advantage of using a high-level programming language?
10.
In an online transaction processing system (OLTP), which of the following actions should be taken when erroneous or invalid transactions are detected?