Course Hero Logo

B development group group of persons who develop the

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 14 - 16 out of 44 pages.

B. Development group: group of persons who develop the policyC. Resource group: resources controlled by the policyD. Access group: group of users to which the policy appliesCorrect Answer:B
Section: (none)ExplanationExplanation/Reference:QUESTION 47Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infectsMicrosoft Word files?CSection: (none)
ExplanationExplanation/Reference:QUESTION 48The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables members of CSIRT to undertake any necessary actions on behalf of theirconstituency?A
Section: (none)ExplanationExplanation/Reference:QUESTION 49Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The personal computer of the criminal in question was confiscated by the county police.Which of the following evidence will lead John in his investigation?D
Section: (none)Explanation- Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:QUESTION 50An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be categorized as a tangible and intangible cost. Identify the tangible cost associatedwith virus outbreak?A. Loss of goodwillB. Damage to corporate reputationC. Psychological damageD. Lost productivity damageCorrect Answer:D
Section: (none)ExplanationExplanation/Reference:QUESTION 51Which of the following incidents are reported under CAT -5 federalagency category?C
Section: (none)ExplanationExplanation/Reference:QUESTION 52One of the goals of CSIRT is to manage security problems by taking a certain approachtowards the customers’ security vulnerabilities and by responding effectively to potential information security incidents. Identify the incident responseapproach that focuses on developing the infrastructure and security processes before the occurrence or detection of an event or any incident:C
Section: (none)ExplanationExplanation/Reference:QUESTION 53

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 44 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
CSIRT, free questions, incident coordinator

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture