Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 48 What is the most important process in an investigation? Assurance Do

ID: 381502 • Letter: Q

Question

Question 48

What is the most important process in an investigation?

Assurance

Documentation

Security

Compliance

Question 49

Generally, regardless of threat or vulnerability, there will ____ be a chance a threat can exploit a vulnerability.

never

occasionally

always

Seldom

Question 42

Which of the following items do HVAC systems not control?

Temperature

Humidity

Air pollution and contamination

Power protection

Question 30

Hierarchical models have many advantages to organizations, but there are also a number of disadvantages. Which of the following is one of the disadvantages?

Accountability can be a problem because when many component teams are involved, it can be difficult to determine whose fault it is if something doesn’t work.

Communication lines are not clearly defined, so it is difficult to find the group that specializes in the area that can help solve it.

Unlike in flat organizations, hierarchical organizations do not have teams dedicated to identifying the next big threat.

There is often a decentralized authority, which can quickly become a negative when the span of control becomes too wide.

Which type of IDS/IPS detection method looks for non-normal traffic?

Stateful Protocol Analysis

Statistical anomaly-based detection

Subscription based detection

None of the above

Question 28

This type of IDS/IPS detection method compares network traffic to pre-configured and pre-determined attack patterns.

Stateful Protocol Analysis

Statistical anomaly-based detection

Subscription based detection

None of the above

Question 14

Jimmy has been hired by ABC Corp. to perform a penetration test. During the discovery phase, Jimmy notices a high risk system that has several vulnerabilities. However, that system is out of the scope of the project. What should Jimmy do?

Test the vulnerable system and provide the results to management.

Make a post online about the vulnerable system.

Immediately notify management of the vulnerable system but take no further actions.

Take no action.

Question 2

A vulnerability is a human-caused or natural event that could impact the system, whereas a risk is a weakness in a system that can be exploited.

True

False

Assurance

Documentation

Security

Compliance

Explanation / Answer

48. Option 2: Documentation

Explanation: Documentations helps in maintaining proper and detailed information in a chornological order, which is very important in any investigation. If all revealed inforamation is nor documented, no coherent and solid evidence cannot be established.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote