You are on page 1of 6

10/12/2015

TheAceStudent:SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)

SAINTLEOCOM540MODULE4MIDTERMEXAM(40
QUESTIONS)
SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)
Question1.Question:
The____isthepointintimebywhichsystemsanddatamustberecoveredafteranoutageas
determinedbythebusinessunit.
trainingobjective
recoverytimeobjective
dependencyobjective
recoverypointobjective
Question2.Question:
The____containstherulesandconfigurationguidelinesgoverningtheimplementationand
operationofIDSswithintheorganization.
securitypolicy
logfile
honeypot
sitepolicy
Question3.Question:
____servicesaretriggeredbyaneventorrequest,suchasareportofacompromisedhost,wide
spreadingmaliciouscode,softwarevulnerability,orsomethingthatwasidentifiedbyanintrusion
detectionorloggingsystem.
Reactive
Forensic
Security
Proactive
Question4.Question:
A(n)____isadocumentcontainingcontactinformationfortheindividualsthatneedtobenotifiedin
theeventofanactualincident.
rootroster
alertroster
hierarchicalroster
sequentialroster
Question5.Question:
____isthecontrolapproachthatattemptstoshifttherisktootherassets,otherprocesses,orother
organizations.
Acceptance
Transference
Mitigation
Avoidance
Question6.Question:
A____dealswiththepreparationforandrecoveryfromadisaster,whethernaturalormanmade.
riskassessment
mitigationplan
riskmanagement
disasterrecoveryplan
Question7.Question:
data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

1/6

10/12/2015

TheAceStudent:SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)

Whichofthefollowingisaproactiveservice?
Incidenthandling
Riskanalysis
Announcements
Alertsandwarnings
Question8.Question:
Afavoritepastimeofinformationsecurityprofessionalsis____,whichisrealistic,headtohead
attackanddefendinformation,securityattacks,andincidentresponsemethods.
paralleltesting
wargaming
simulation
structuredwalkthrough
Question9.Question:
Inanorganization,unexpectedactivitiesoccurperiodicallythesearereferredtoas____.
warnings
problems
afteraction
events
Question10.Question:
The____jobfunctionsfocusmoreoncostsofsystemcreationandoperation,easeofusefor
systemusers,andtimelinessofsystemcreation,aswellastransactionresponsetime.
organizationalmanagementandprofessionals
informationtechnologymanagementandprofessionals
humanresourcemanagementandprofessional
informationsecuritymanagementandprofessionals
Question11.Question:
____isthecontrolapproachthatattemptstoreducetheimpactcausedbytheexploitationof
vulnerabilitythroughplanningandpreparation.
Acceptance
Avoidance
Transference
Mitigation
Question12.Question:
____occurswhenvalidpacketsexploitpoorlyconfiguredDNSserverstoinjectfalseinformationto
corrupttheserversanswerstoroutineDNSqueriesfromothersystemsonthatnetwork.
DNScachepoisoning
Clipping
Signaturematching
Clustering
Question13.Question:
____isacommonapproachusedinthedisciplineofsystemsanalysisanddesign.
Databasediagramming
Networkdiagramming
Applicationdiagramming
Systemsdiagramming
Question14.Question:
A____isadocumentthatexpresseshowanorganizationensuresthatcriticalbusinessfunctions
continueatanalternatelocationwhiletheorganizationrecoversitsabilitytofunctionattheprimary
siteifacatastrophicincidentordisasteroccurs.
riskassessmentplan
data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

2/6

10/12/2015

TheAceStudent:SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)

worm
Trojanhorse
businesscontinuityplan
Question15.Question:
____areimportantwhenteammembersarepreparingadvisoriesandprocedures.
Writingskills
Forensicskills
Medicalskills
Mathematicalskills
Question16.Question:
____isanIDSsabilitytodynamicallymodifyitssitepoliciesinreactionorresponseto
environmentalactivity.
AlarmCompaction
TrueAttackStimulus
ConfidenceValue
Sitepolicyawareness
Question17.Question:
A(n)____isanyclearlyidentifiedattackontheorganizationsinformationassetsthatwould
threatentheassetsconfidentiality,integrity,oravailability.
incident
threat
Trojanhorse
worm
Question18.Question:
A____isatypeofIDSthatissimilartotheNIDS,reviewsthelogfilesgeneratedbyservers,
networkdevices,andevenotherIDSs.
logfilemonitor
DNScache
honeypot
alarmcluster
Question19.Question:
The____canbeusedtocollectinformationdirectlyfromtheendusersandbusinessmanagers.
forensicanalysis
systemlogsession
facilitateddatagatheringsession
datamanagementsession
Question20.Question:
____aretoolsusedtoidentifywhichcomputersareactiveonanetwork,aswellaswhichportsand
servicesareactiveonthecomputers,whatfunctionorrolethemachinesmaybefulfilling,andso
on.
Filters
Scanningutilities
Clusters
Triggers
Question21.Question:
A____isacomputerserverconfiguredtoresembleaproductionsystem,containingrich
informationjustbeggingtobehacked.
networkcluster
honeypot
smartIDS
data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

3/6

10/12/2015

TheAceStudent:SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)

DNScache
Question22.Question:
____enablesauthorizeduserspersonsorcomputersystemstoaccessinformationwithout
interferenceorobstruction,andtoreceiveitintherequiredformat.
Riskassessment
Integrity
Availability
Confidentiality
Question23.Question:
____ensuresthatonlythosewiththerightsandprivilegestoaccessinformationareabletodoso.
Confidentiality
Riskassessment
Integrity
Availability
Question24.Question:
____istheprocessofmovingtheorganizationtowarditsvision.
Transference
Avoidance
Mitigation
Strategicplanning
Question25.Question:
Usingaprocessknownas____,NetworkIDSsmustlookforattackpatternsbycomparing
measuredactivitytoknownsignaturesintheirknowledgebasetodeterminewhetherornotan
attackhasoccurredormaybeunderway.
cachepoisoning
signaturematching
clipping
scanning
Question26.Question:
A(n)____isaSIRTteammember,otherthantheteamleader,whoiscurrentlyperformingthe
responsibilitiesoftheteamleaderinscanningtheorganizationsinformationinfrastructureforsigns
ofanincident.
IRdutyofficer
softwareengineer
forensicexpert
projectmanager
Question27.Question:
____isthecoherentapplicationofmethodicalinvestigatorytechniquestosolvecrimecases.
AlarmCompaction
Scanning
Forensics
Signaturematching
Question28.Question:
____istheprocessofsystematicallyexamininginformationassetsforevidentiarymaterialthatcan
provideinsightintohowtheincidenttranspired.
Incidentresponse
Forensicsanalysis
Wargaming
Disasterrecovery
Question29.Question:
data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

4/6

10/12/2015

TheAceStudent:SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)

A(n)____isgenerallythoughtofasagroupofindividualsunitedbysharedinterestsorvalues
withinanorganizationandwhoshareacommongoalofmakingtheorganizationfunctiontomeetits
objectives.
networkcommunity
communityofinterest
databasecommunity
incidentresponsecommunity
Question30.Question:
Theviolationoffairuseofcopyrightedmaterialisanexampleofa(n)____.
compromisetointellectualproperty
actofhumanerror
deliberateactofinformationdistortion
deliberateactoftrespass
Question31.Question:
A(n)____isaneventthattriggersalarmsandcausesafalsepositivewhennoactualattacksarein
progress.
TrueAttackStimulus
alert
falsenegative
falseattackstimulus
Question32.Question:
A(n)____isadetailedexaminationoftheeventsthatoccurredfromfirstdetectiontofinalrecovery.
reactivereview
proactivereview
auditreview
afteractionreview
Question33.Question:
A(n)____isatypeofattackoninformationassetsinwhichtheinstigatorattemptstogain
unauthorizedentryintoasystemornetworkordisruptthenormaloperationsofasystemor
network.
event
intrusion
alert
honeypot
Question34.Question:
A(n)____requiresthatacontactpersoncalleachandeverypersonontheroster.
rootroster
alertroster
sequentialroster
hierarchicalroster
Question35.Question:
The____istheperiodoftimewithinwhichsystems,applications,orfunctionsmustberecovered
afteranoutage.
trainingobjective
recoverytimeobjective
recoverypointobjective
dependencyobjective
Question36.Question:
A(n)____mustleadtheprojectandmakesureasoundprojectplanningprocessisused,a
completeandusefulprojectplanisdeveloped,andprojectresourcesareprudentlymanagedto
data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

5/6

10/12/2015

TheAceStudent:SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)

reachthegoalsoftheproject.
champion
crisismanager
projectmanager
incidentmanager
Question37.Question:
____servicesaugmentexistingandwellestablishedservicesthatareindependentofincident
handlingandtraditionallyperformedbyotherareasofanorganizationsuchastheIT,Audit,or
Trainingdepartments.
Reactive
Forensic
Proactive
Securityqualitymanagement
Question38.Question:
A(n)____ispreparedbytheorganizationtoanticipate,reactto,andrecoverfromeventsthat
threatenthesecurityofinformationandinformationassetsintheorganization,and,subsequently,
torestoretheorganizationtonormalmodesofbusinessoperations.
asset
threat
socialplan
contingencyplan
Question39.Question:
A____isanalarmoralertthatindicatesthatanattackisinprogressorthatanattackhas
successfullyoccurredwheninfacttherewasnosuchattack.
sitepolicy
falsepositive
falsenegative
ConfidenceValue
Question40.Question:
A(n)____isaninvestigationandassessmentoftheimpactthatvariousattackscanhaveonthe
organization.
threat
BIA
incident
intellectualproperty
SAINTLEOCOM540MODULE4MIDTERMEXAM(40QUESTIONS)

data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

6/6

You might also like