16 Questions
In the context of business continuity planning, what should a company do to ensure the protection of personnel?
Review architectural plans to determine the number of emergency exits
For IT services delivered from a Tier 4 data center, what failure should the IT manager be concerned with when preparing a Business Continuity Plan?
Power failure
According to ISO 27001 and 27002 standards, when can management responsibilities be defined?
Only when assets are clearly defined
Which technology would be the MOST cost-effective reactive control for protecting personnel in public areas?
Supplying a duress alarm for personnel exposed to the public
What is the most critical factor to consider to ensure the effectiveness of security controls?
Continuous testing of controls
What should be the initial step to preserve evidence when a desktop computer is involved in a security incident?
Starting documentation
During forensic analysis, what is the most crucial action when trying to determine the purpose of an unknown application?
Isolating the system from the network
What does a Business Continuity Plan (BCP) provide in the event of a disaster?
Protection from loss of organizational resources
When is a Business Continuity Plan (BCP) considered valid?
When validated through realistic exercises
Which aspect must recovery strategies in Disaster Recovery Planning (DRP) be in sync with?
Business continuity tests
What is the next step following completion of a Business Impact Analysis (BIA) according to Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices?
Identify and select recovery strategies
During a vulnerability test on an Information System (IS), what is the primary objective?
Evaluate the effectiveness of security controls
Who must approve modifications to an organization's production infrastructure configuration?
Change control board
What is the critical aspect when implementing controls in a heterogeneous end-point network for an organization?
Hosts being able to establish network communications
What does a Denial of Service (DoS) attack typically aim to achieve?
Delay or disrupt services for legitimate users
What is one essential goal of testing an organization's Business Continuity Plan/Disaster Recovery Plan (BCP/DRP)?
Test the organization's ability to recover its operations
Test your knowledge on protecting the chain of evidence in computer forensics. Questions range from actions to take when a desktop computer is involved to ensuring evidence integrity throughout the investigation process.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free