Question 48 What is the most important process in an investigation? Assurance Do
ID: 381502 • Letter: Q
Question
Question 48
What is the most important process in an investigation?
Assurance
Documentation
Security
Compliance
Question 49
Generally, regardless of threat or vulnerability, there will ____ be a chance a threat can exploit a vulnerability.
never
occasionally
always
Seldom
Question 42
Which of the following items do HVAC systems not control?
Temperature
Humidity
Air pollution and contamination
Power protection
Question 30
Hierarchical models have many advantages to organizations, but there are also a number of disadvantages. Which of the following is one of the disadvantages?
Accountability can be a problem because when many component teams are involved, it can be difficult to determine whose fault it is if something doesn’t work.
Communication lines are not clearly defined, so it is difficult to find the group that specializes in the area that can help solve it.
Unlike in flat organizations, hierarchical organizations do not have teams dedicated to identifying the next big threat.
There is often a decentralized authority, which can quickly become a negative when the span of control becomes too wide.
Which type of IDS/IPS detection method looks for non-normal traffic?
Stateful Protocol Analysis
Statistical anomaly-based detection
Subscription based detection
None of the above
Question 28
This type of IDS/IPS detection method compares network traffic to pre-configured and pre-determined attack patterns.
Stateful Protocol Analysis
Statistical anomaly-based detection
Subscription based detection
None of the above
Question 14
Jimmy has been hired by ABC Corp. to perform a penetration test. During the discovery phase, Jimmy notices a high risk system that has several vulnerabilities. However, that system is out of the scope of the project. What should Jimmy do?
Test the vulnerable system and provide the results to management.
Make a post online about the vulnerable system.
Immediately notify management of the vulnerable system but take no further actions.
Take no action.
Question 2
A vulnerability is a human-caused or natural event that could impact the system, whereas a risk is a weakness in a system that can be exploited.
True
False
Assurance
Documentation
Security
Compliance
Explanation / Answer
48. Option 2: Documentation
Explanation: Documentations helps in maintaining proper and detailed information in a chornological order, which is very important in any investigation. If all revealed inforamation is nor documented, no coherent and solid evidence cannot be established.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.