Question 31

Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the infected hosts from the information system?

Correct Answer:B

Question 32

Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will maintain the information assurance (IA) and security posture of a system or site.

Correct Answer:D

Question 33

Lack of forensic readiness may result in:

Correct Answer:D

Question 34

A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the worm include:

Correct Answer:C

Question 35

An active vulnerability scanner featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis is called:

Correct Answer:A

Question 36

Keyloggers do NOT:

Correct Answer:B

START 212-89 EXAM