Question 1. The _____ should provide the incident response plan as its first deliverable.
Emergency response team
Incident response team
IR planning committee
None of the above
Question 2. The successful execution of a _____ begins with admitting that there is a problem.
patch management program
management strategy
Both of the above
Business Continuity Plan (BCP)
Question 3. Confidentiality, integrity, and availability reflect upon the relative _____ of an information system.
accessibility
security
patch level
None of the above
Question 4. Which of the following refers to the way that an information system is capable of identifying those who do not have the right to know and access information?
Integrity
Risk assessment
Access lists
Confidentiality
Question 5. There is nothing that _____ can do to improve the bottom line.
management
information technology
marketing
risk management
Question 6. The CNSS model of information security evolved from a concept known as the _____.
CIA triangle
CIA process
Bermuda triangle
None of the above
Question 7. A threat is a category of all of the following except for what?
Objects
Persons
All of the above
None of the above
Question 8. The BIA takes up where the _____ leaves off.
risk assessment process
business continuity plan
qualitative evaluation
business management board
Question 9. A false positive is a non-event that is categorized as _____.
a false negative
an actual incident
a reliable indicator
a threat vector
Question 10. False positives or noise often result from which of the following causes in an incident collection candidate?
Risk assessment
Policy
Antivirus definitions
All of the above