- Chapter 11 – Incident handling
- An incident is
- a) A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices
- b) The part of the incident response policy that specifies the targets of the policy
- c) The act of following applicable laws, regulations, rules, industry codes and contractual obligations
- d) Staff designated to respond to incidents
Answer: (a)
- The stages of incident handling include
- a) Planning, detection, maintenance, retirement
- b) Preparation, detection, containment, post-incident analysis
- c) Planning, acquisition, deployment, post-incident analysis
- d) Preparation, acquisition, deployment, post-incident analysis
Answer: (b)
- Preparation for incident response includes all of the following except
- a) Creating an incident response policy
- b) Creating an incident response team
- c) Containing the harm from an incident
- d) Creating a communication plan during incidents
Answer: (c)
- The scope of an incident response policy is
- a) A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices
- b) The act of following applicable laws, regulations, rules, industry codes and contractual obligations
- c) Staff designated to respond to incidents
- d) The part of the incident response policy that specifies the targets of the policy
Answer: (d)
- An incident response policy is
- a) A description of the standard methods used by an organization to handle information security incidents
- b) A description of security policies, acceptable use policies, or standard security practices
- c) A specification of the targets of the policy
- d) The act of following applicable laws, regulations, rules, industry codes and contractual obligations
Answer: (a)
- Since the incident response policy is developed following strict procedures including top management approval, its existence generally is an assurance that the organization will respond satisfactorily to an information security incident
- a) True
- b) False
Answer: (b)
- The IRT is
- a) A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices
- b) The part of the incident response policy that specifies the targets of the policy
- c) Staff designated to respond to incidents
- d) The act of following applicable laws, regulations, rules, industry codes and contractual obligations
Answer: (c)
- During an incident, the IRT is involved with all of the following, except
- a) Identifying the threats to the organization from the incident
- b) Mitigating risks
- c) Communicating with stakeholders
- d) Issuing a final report
Answer: (c)
- During an incident, it is advisable to pull members away from current projects to assist the IRT
- a) True
- b) False
Answer: (a)
- The leader of the IRT is preferably
- a) Someone from the senior leadership of the organization
- b) A technically competent professional with high credibility within the organization
- c) The functional leader of the business unit affected by the incident
- d) The leader of the IT function within the organization
Answer: (b)
Reviews
There are no reviews yet.