1. Which of the following statements is true regarding security incidents?
Security incidents cannot occur when security measures such as firewalls, properly configured VPNs, and secure network
procedures are in place.
Security incidents can arise from a number of sources, including human error or mistakes.
Deliberate actions that cause loss or harm to the organization are not considered security incidents.
Organizations must simply learn to live with the impact and associated costs of security incidents.
10 points
Question 2
1. The five-step formula that serves as the basis for incident response processes and procedures includes:
accept, adjust, adapt, acclimate, and relate to security incidents.
refute, deter, discourage, defend, and correct security incidents.
identify, research, reject, process, and detail security incidents.
prevent, detect, respond, control, and document security incidents.
10 points
Question 3
1. What types of automated tools provide information about the current operating state of a computer
system?
System configuration tools
System information tools
System administration tools
System analysis tools
10 points
Question 4
1. What types of automated tools are used to scan an operating system and key software applications for
security issues?
System configuration tools
System information tools
System administration tools
System analysis tools
10 points
Question 5
1. Windows Computer Management and Windows Task Manager are what type of tools?
System configuration tools
System information tools
System administration tools
System analysis tools
10 points
Question 6
1. Microsoft Baseline Security Analyzer (MBSA) is a:
system configuration tool.
system information tool.
system administration tool.
system analysis tool.
Get Free Quote!
269 Experts Online