110. Initial analysis revealed that an employee is the apparent target of or is suspected of causing a computer security incident in a company. Which of the following should be notified
first?a.
Legal departmentb.
Human resources departmentc.
Public affairs departmentd.
Information security departmentThe other three choices are incorrect because these departments are not the ones that should be notified first, even though they are involved later. The role of the legal department is to review incident response plans, policies, and procedures to ensure their compliance with laws and regulations. The legal department comes into play when an incident has legal ramifications, including evidence collection, prosecution of a suspect, or potential for a lawsuit. The role of the public affairs department is to inform the media and the law enforcement authorities depending on the nature and impact of an incident. The role of the information security department is to conduct the initial analysis of incidents and later to contain an incident with altering network security controls (such as firewall rulesets).
111. Which of the following solutions to overcome log management challenges address periodic audits and testing and validation?
a.
Prioritize log management function.b.
Establish policies and procedures for log management.c.
Maintain a secure log management infrastructure.d.
Provide training for all staff with log management responsibilities.112. A well-defined incident response capability helps the organization in which of the following ways?
1.
Detect incidents rapidly.2.
Minimize loss and destruction.3.
Identify weaknesses.4.
Restore IT operations rapidly.a.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 4113. Regarding incident containment, which one of the following items makes the other items much easier to accomplish?
a.
Strategies and proceduresb.
Shutting down a systemc.
Disconnecting a system from the networkd.
Disabling certain system functions114. Which of the following statements is
a.
After a resource is successfully attacked, it is not attacked again.b.
After a resource is successfully attacked, other resources within an organization are attacked in a similar manner.c.
After an incident has been contained, it is necessary to delete malicious code.d.
After an incident has been contained, it is necessary to disable breached user accounts.115. A reliable way to detect superzapping of work is by:
a.
Comparing current data files with previous data filesb.
Examining computer usage logs