110. Initial analysis revealed that an employee is the apparent target of or is suspected of causing a computer security incident in a company. Which of the following should be notified first?
a. Legal department
b. Human resources department
c. Public affairs department
d. Information security department
The other three choices are incorrect because these departments are not the ones that should be notified first, even though they are involved later. The role of the legal department is to review incident response plans, policies, and procedures to ensure their compliance with laws and regulations. The legal department comes into play when an incident has legal ramifications, including evidence collection, prosecution of a suspect, or potential for a lawsuit. The role of the public affairs department is to inform the media and the law enforcement authorities depending on the nature and impact of an incident. The role of the information security department is to conduct the initial analysis of incidents and later to contain an incident with altering network security controls (such as firewall rulesets).
111. Which of the following solutions to overcome log management challenges address periodic audits and testing and validation?
a. Prioritize log management function.
b. Establish policies and procedures for log management.
c. Maintain a secure log management infrastructure.
d. Provide training for all staff with log management responsibilities.
112. A well-defined incident response capability helps the organization in which of the following ways?
1. Detect incidents rapidly.
2. Minimize loss and destruction.
3. Identify weaknesses.
4. Restore IT operations rapidly.
a. 1 and 2
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
113. Regarding incident containment, which one of the following items makes the other items much easier to accomplish?
a. Strategies and procedures
b. Shutting down a system
c. Disconnecting a system from the network
d. Disabling certain system functions
114. Which of the following statements is
a. After a resource is successfully attacked, it is not attacked again.
b. After a resource is successfully attacked, other resources within an organization are attacked in a similar manner.
c. After an incident has been contained, it is necessary to delete malicious code.
d. After an incident has been contained, it is necessary to disable breached user accounts.
115. A reliable way to detect superzapping of work is by:
a. Comparing current data files with previous data files
b. Examining computer usage logs