Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

ECIH - 163q || 100% Errorless Solutions.

Puntuación
-
Vendido
-
Páginas
30
Grado
A+
Subido en
17-02-2026
Escrito en
2025/2026

ECIH - 163q || 100% Errorless Solutions.

Institución
ECIH
Grado
ECIH

Vista previa del contenido

ECIH - 163q || 100% Errorless Solutions.
1
Which of the following terms may be defined as ga measure of possible inability to achieve a
goal, objective, or target within a defined security, cost plan and technical limitations that
adversely affects the organizationfs operation and revenues?
A. Risk
B. Vulnerability
C. Threat
D. Incident Response correct answers A

2
A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a
single system is targeted by a large number of infected machines over the Internet. In a DDoS
attack, attackers first infect multiple systems which are known as:
A. Trojans
B. Zombies
C. Spyware
D. Worms correct answers B

3
The goal of incident response is to handle the incident in a way that minimizes damage and
reduces recovery time and cost. Which of the following does NOT constitute a goal of incident
response?
A. Dealing with human resources department and various employee conflict behaviors.
B. Using information gathered during incident handling to prepare for handling future incidents
in a better way and to provide stronger protection for systems and data.
C. Helping personal to recover quickly and efficiently from security incidents, minimizing loss
or theft and disruption of services.
D. Dealing properly with legal issues that may arise during incidents. correct answers A

4
An organization faced an information security incident where a disgruntled employee passed
sensitive access control information to a competitor. The organizationfs incident response
manager, upon investigation, found that the incident must be handled within a few hours on the
same day to maintain business continuity and market competitiveness. How would you
categorize such information security incident?
A. High level incident
B. Middle level incident
C. Ultra-High level incident
D. Low level incident correct answers A

5
Business continuity is defined as the ability of an organization to continue to function even after
a disastrous event, accomplished through the deployment of redundant hardware and software,

,the use of fault tolerant systems, as well as a solid backup and recovery strategy. Identify the
plan which is mandatory part of a business continuity plan?
A. Forensics Procedure Plan
B. Business Recovery Plan
C. Sales and Marketing plan
D. New business strategy plan correct answers B

6
The flow chart gives a view of different roles played by the different personnel of CSIRT.
Identify the incident response personnel denoted by A, B, C, D, E, F and G.

Image: https://tinyurl.com/38fd2bya

A. A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E-
Human Resource, F-Constituency, G-Incident Manager
B. A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E-
Human Resource, F-Constituency, G-Incident Manager
C. A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human
Resource, F-Incident Analyst, G-Public relations
D. A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human
Resource, F-Constituency, G-Incident Coordinator correct answers C

7
Which of the following is an appropriate flow of the incident recovery steps?
A. System Operation-System Restoration-System Validation-System Monitoring
B. System Validation-System Operation-System Restoration-System Monitoring
C. System Restoration-System Monitoring-System Validation-System Operations
D. System Restoration-System Validation-System Operations-System Monitoring correct
answers D

8
A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with
computer security incidents. Identify the procedure that is NOT part of the computer risk policy?
A. Procedure to identify security funds to hedge risk
B. Procedure to monitor the efficiency of security controls
C. Procedure for the ongoing training of employees authorized to access the system
D. Provisions for continuing support if there is an interruption in the system or if the system
crashes correct answers C

9
Identify the network security incident where intended authorized users are prevented from using
system, network, or applications by flooding the network with high volume of traffic that
consumes all existing network resources.
A. URL Manipulation
B. XSS Attack
C. SQL Injection

, D. Denial of Service Attack correct answers D

10
Incident handling and response steps help you to detect, identify, respond and manage an
incident. Which of the following steps focus on limiting the scope and extent of an incident?
A. Eradication
B. Containment
C. Identification
D. Data collection correct answers B

11
Identify the malicious program that is masked as a genuine harmless program and gives the
attacker unrestricted access to the userfs information and system. These programs may unleash
dangerous programs that may erase the unsuspecting userfs disk and send the victimfs credit card
numbers and passwords to a stranger.
A. Cookie tracker
B. Worm
C. Trojan
D. Virus correct answers C

12
Quantitative risk is the numerical determination of the probability of an adverse event and the
extent of the losses due to the event. Quantitative risk is calculated as:
A. (Probability of Loss) X (Loss)
B. (Loss) / (Probability of Loss)
C. (Probability of Loss) / (Loss)
D. Significant Risks X Probability of Loss X Loss correct answers A

13
An incident recovery plan is a statement of actions that should be taken before, during or after an
incident. Identify which of the following is NOT an objective of the incident recovery plan?
A. Creating new business processes to maintain profitability after incident
B. Providing a standard for testing the recovery plan
C. Avoiding the legal liabilities arising due to incident
D. Providing assurance that systems are reliable correct answers A

14
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally
begins with the likeliness of an eventfs occurrence, the harm it may cause and is usually denoted
as Risk = ƒ°(events)X(Probability of occurrence)
X?
A. Magnitude
B. Probability
C. Consequences
D. Significance correct answers A

Escuela, estudio y materia

Institución
ECIH
Grado
ECIH

Información del documento

Subido en
17 de febrero de 2026
Número de páginas
30
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$15.69
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
763
Miembro desde
3 año
Número de seguidores
439
Documentos
38001
Última venta
1 día hace
Reign Supreme Scholarly || Enlightened.

Get your revised study materials available here and elevate your educational outcomes. I have numerous verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. I am dedicated to offering you the best and unique learning content. You are encouraged to inquire further assistance from this end whenever need be. Kindly remember to leave your review, understanding your satisfaction is essential . We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lee mas Leer menos
3.7

114 reseñas

5
49
4
20
3
22
2
8
1
15

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes