Risk Management Flashcards
1
Q
Which of the following options is a valid type of evidence in a computer forensics investigation that proves innocence? A. Documentary evidence B. Demonstrative evidence C. Exculpatory evidence D. Inculpatory evidence
A
C. Exculpatory evidence
2
Q
A large chemical company will soon be legally required to offer phone support for customers to contact in the event of a chemical spill of other similar issue. the new law requires the company be available 24/7, 365 days a year or large fines will be levied against the company. You have been contacted to ensure a power outage does not prevent the help-desk from being available to callers. You have been given the requirement that all electronic equipment (desktops, servers, network equipment, phones, etc.) must operate for up to 24 hours without interruption during a power outage. Which of the following options would best meet requirement? A. Emergency power B. Online UPS C. Line-Interactive UPS D. Generator
A
D. Generator
3
Q
Which of the following options is the most costly form of disaster recovery options? A. Full-scale B. Walkthrough C. Archive review D. Tabletop exercise
A
A. Full-scale
4
Q
You are a network engineer for a mid-sized consulting company. Your employer is currently in the role of a systems integrator for a transformation project at a retail company. You have been tasked with configuring a new network switch. Upon accessing the switch via SSH you receive a message stating "Only authorized users from ACME Enterprise and authorized 3rd party partners are permitted". You are not required to acknowledge or accept this warning in anyway. What type of control best classifies this type of message? A. Preventative B. Deterrent C. Detective D. Administrative
A
B. Deterrent
Warning message
5
Q
You are in the onboarding process with a new employer. Your new manager has asked you to review and sign a document that outlines how you can use their IT systems and what types of uses are not permitted. What type of policy document is this? A. Social media policy B. Email and access policy C. Acceptable use policy D. Adverse actions policy
A
C. Acceptable use policy
6
Q
What is the third step of the incident process? A. Containment B. Eradication C. Recovery D. Lessons learned
A
A. Containment
7
Q
What acronym refers to the amount of time between the failure of a device and the device's return to normally functionality? A. MTTR B. MTTF C. MTBF D. MRTR
A
A. MTTR