COUNTERMEASURES WGU QUIZLET
(EC COUNCIL CIH V2) BY BRIAN
MACFARLANE
Whichpoofpothepofollowingpoinformationposecuritypoelementspoensurespothatpothepoinformat
ionpoispoaccessiblepoonlypotopothosepowhopoarepoauthorizedpotopohavepoaccess?
Apoauthenticity
Bpoconfidentiality
Cpointegrity
Dpoavailabilitypo-poans--B
Identifypothepoinformationposecuritypoelementpothatpodeterminespotrustworthinesspoofpodat
apoorporesourcespoinpotermspoofpopreventingpoimproperpoandpounauthorizedpochanges.
Apointegrity
Bpoavailability
Cpoauthenticity
Dponon-repudiationpo-poans--A
John,poaposecuritypoprofessionalpoworkingpoforpoXdocpoCorporation,poispoimplementingpoa
posecuritypostrategypothatpousespomultilayeredpoprotectionpothroughoutpoanpoinformationpo
systempotopohelppominimizepoanypoadversepoimpactpofrompoattackspoonpoorganizationalpo
assets.
IdentifypotheposecuritypostrategypoJohnpohaspoimplemented.
Apocovertpochannel
Bpodefense-in-depth
Cpolikelihoodpoanalysis
Dpothree-waypohandshakepo-poans--B
,Identifypotheposecuritypopolicypothatpodoesn'tpokeeppoanyporestrictionspoonpothepousagepoo
fposystemporesources.
Apopromiscuouspopolicy
Bpoprudentpopolicy
Cpoparanoidpopolicy
Dpopermissivepopolicypo-poans--A
Carlpoispotryingpotopoviolatepothepoacceptablepousepoofpoaponetworkpoandpocomputerpousep
opolicy.poUnderpowhichpocategorypoofpothepoincidentpohandlingpocriteriapodoespothisposcen
ariopofall?
ApoCATpo4
BpoCATpo2
CpoCATpo1
DpoCATpo3po-poans--A
Inpowhichpoofpothepofollowingpostagespoofpoincidentpohandlingpodoespoclassificationpoandpo
prioritizationpoofpoincidentspotakepoplace?
Apoincidentporecordingpoandpoassignment
Bpoincidentpocontainment
Cpopost-incidentpoactivities
Dpoincidentpotriagepo-poans--D
Whichpoofpothepofollowingpotermsporeflectspoanpoorganization'spomid-termpoandpolong-
termpogoalspoforpoincidentpomanagementpocapabilities?
ApoIH&Rpoteampomodels
BpoIH&Rpomission
CpoIH&Rpostaffing
DpoIH&Rpovisionpo-poans--D
Whichpoofpothepofollowingpotermspodefinespothepopurposepoandposcopepoofpothepoplanned
poincidentpohandlingpoandporesponsepocapabilities?
ApoIH&Rpomission
BpoIH&Rpostaffing
CpoIH&Rpoteampomodels
DpoIH&Rpovisionpo-poans--A
Whichpoofpothepofollowingpobackuppostrategiespoprovidespodailypostatuspoofpothepobackupp
osituation,posuchpoasposuccessful,pounsuccessful,ponotporun,pooutpoofpospace,poetc.?
Aposecurity
Bpoguarantee
,Cpodatapoavailability
Dponotificationspo-poans--D
JohnpoispoanpoincidentporesponsepomanagerpoatpoXYZpoInc.poAspoapopartpoofpoIH&Rpopoli
cypoofpohispoorganization,poheposignedpoapocontractpobetweenpothepoorganizationpoandpoa
pothird-
partypoinsurerpotopoprotectpoorganizationpoindividualspofrompodifferentpothreatspoandporisk
s.
WhatpoispothepocontractposignedpobypoJohnpocalled?
Apoescrowpoagreement
Bpodisclosurepoagreement
CpoROEpoagreement
Dpocyberpoinsurancepo-poans--D
JasonpoispoanpoincidentpohandlerpoatpoThepoRollspoInc.poOnepodaypohispoorganizationpoen
counterspoapomassivepocyberattack,poandpohepoidentifiespoapoviruspocalledpo"XYZ@ZYX"p
ospreadingpoamongpothepocomputerspoinpotheponetworkpo(AKA,poapolevelpoCATpo3poattack
).
Hepohaspostartedpoinvestigatingpothepoissue;pohowever,poaspoanpoincidentpohandler,powithi
npohowpomuchpotimepofrompodetectionpoofposuchpomaliciouspocodepoattacksposhouldpohepo
reportpotopothepoauthorities?
Apoonepoweek
Bpoonepofortnight
Cpothreepohours
Dpoonepohourpo-poans--D
Whichpoofpothepofollowingpophasespoofpothepocomputerpoforensicspoinvestigationpoprocess
poinvolvespoacquisition,popreservation,poandpoanalysispoofpoevidentiarypodatapotopoidentify
potheposourcepoofpoapocrimepoandpothepoculpritpobehindpoit?
Apopre-investigationpophase
Bpoinvestigationpophase
Cpovulnerabilitypoassessmentpophase
Dpopost-investigationpophasepo-poans--B
Whichpoofpothepofollowingpoactivitiespoispoperformedpobypoanpoincidentpohandlerpoduringpot
hepopre-investigationpophasepoofpocomputerpoforensics?
Aposearchpoandposeizure
Bpoevidencepoassessment
Cpodatapoacquisition
Dporiskpoassessmentpo-poans--D
, James,poanpoincidentporesponderpoatpoTrinitypoInc.,poispoinvestigatingpoapocybercrime.poIn
pothepoprocess,pohepocollectedpothepoevidencepodatapofrompothepovictimposystemspoandpos
tartedpoanalyzingpothepocollectedpodata.
IdentifypothepocomputerpoforensicspoinvestigationpophasepoJamespoispocurrentlypoin.
Aporiskpoassessmentpophase
Bpopost-investigationpophase
Cpopre-investigationpophase
Dpoinvestigationpophasepo-poans--D
Whichpoofpothepofollowingpotermsporeferspotopoanpoorganization'spoabilitypotopomakepoopti
malpousepoofpodigitalpoevidencepoinpoapolimitedpoperiodpoofpotimepoandpowithpominimalpoinv
estigationpocosts?
Apoexpertpotestimony
Bpoforensicporeadiness
Cpodatapoacquisition
Dpofirstporesponsepo-poans--B
Whichpoofpothepofollowingpoforensicporeadinesspoprocedurespohelpspoanpoincidentporespo
nderpoinpogatheringpousefulpoinformationpoaboutpotheposystempobehaviorpothroughpofilepoi
ntegritypomonitoring?
Apohostpomonitoring
Bporiskpoassessment
Cponetworkpomonitoring
Dpoevidencepoassessmentpo-poans--A
Florapoispoanpoincidentpohandlerpoatpoanpoorganizationpothatpoispoimplementingpoforensicp
oreadinesspoprocedurespotopohandlepoevolvingpocyberpothreats.poAspopartpoofpothispoproce
ss,poshepodecidedpotopousepoanpoadvancedpoauthenticationpoprotocolpotoposecurepothepoo
rganizationalponetworkporesources.
WhichpoofpothepofollowingpoprotocolspomustpoFlorapoemploy?
ApoKerberos/IPSec
BpoICMP/UDP
CpoTCP/IP
DpoFTP/HTTPpo-poans--A
Whichpoofpothepofollowingposourcespoofpoevidencepohelpspoanpoincidentporesponderpotopoc
ollectpoinformationpothatpoguidespohimpoorpoherpoinpobuildingpothepotimelinepoofpoattack?
Apofinancialposervices