Question 13

Incident may be reported using/ by:

Correct Answer:D

Question 14

Insiders may be:

Correct Answer:D

Question 15

The ability of an agency to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy is known as:

Correct Answer:B

Question 16

In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the system identified?

Correct Answer:C

Question 17

A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be presented in a court of law in a coherent and meaningful format is called:

Correct Answer:B

Question 18

Which of the following may be considered as insider threat(s):

Correct Answer:B

START 212-89 EXAM