Incident Handling Total Questions - 10 1. Evidence must be preserved from which MAIN factors? I. People II. Electromagnetic radiation III. Weather I and II only I, II, and III II and III only I and III only 2. An OS security policy is one that outlines the processes of ensuring that the system maintains a certain level of _____, _____ and _____. integrity, resources, personnel integrity, confidentiality, availability data, knowledge, availability records, hardware, availability 3. A risk matrix is an illustrated graph that combines which two factors to calculate the risk rating? Severity and likelihood Certainty and likelihood Probability and certainty Severity and certainty 4. When considering data recovery options, what is another factor organizations may have to consider? Privacy and other laws that may affect the data Why the organization has so much data in the first place Whether the data can be made pretty during restoration If the data can be sold after it recovered 5. Which of the following statements best defines incidentmanagement? Incident management is risk minimization. Incident management is a consistent approach to responding to and resolving issues. Incident management is problem resolution. Incident management is forensic containment. 6. Which of the following terms best describes a signal orwarning that an incident may occur in the future? A sign A precursor An indicator Forensic evidence 7. Which of the following is an example of an external incident notification? Notifying the internal incident response team Informing senior management Contacting law enforcement agencies Updating incident logs 8. Which of the following is used to record a crime scene? I. Written notes II. Videos III. Photographs II only I, II, and III I and III only I only 9. An information security incident can_________. compromise business security disrupt operations impact customer trust All of the above 10. Which policy informs users on how to handle an organization's confidential or sensitive information? Business Continuity Plan Information Security Policy Email/Communication Policy Remote Access Policy ပေးပို့ပါ