1. Which of the following would have the HIGHEST priority in a business continuity plan (BCP)?
A) Resuming critical processes B) Recovering sensitive processes C) Restoring the site D) Relocating operations to an alternative site
2. Network ILD&P are typically installed:
A) on the organization's internal network connection. B) on the organization's internet network connection. C) on each end user stations. D) on the firewall. E) None of the choices.
3. Host Based ILD&P primarily addresses the issue of:
A) information integrity B) information accuracy C) information validity D) information leakage E) None of the choices.
4. Software is considered malware based on:
A) the intent of the creator. B) its particular features. C) its location. D) its compatibility. E) None of the choices.
5. Which of the following are valid examples of Malware:
A) viruses B) worms C) trojan horses D) spyware E) All of the above
1. Right Answer: A Explanation: The resumption of critical processes has the highest priority as it enables business processes to begin immediately after the interruption and not later than the declared mean time between failure (MTBF). Recovery of sensitive processes refers to recovering the vital and sensitive processes that can be performed manually at a tolerable cost for an extended period of time and those that are not marked as high priority. Repairing and restoring the site to original status and resuming the business operations are time consuming operations and are not the highest priority. Relocating operations to an alternative site, either temporarily or permanently depending on the interruption, is a time consuming process; moreover, relocation may not be required.
2. Right Answer: B Explanation: Information Leakage Detection and Prevention (ILD&P) is a computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders. Network ILD&P are gateway-based systems installed on the organization's internet network connection and analyze network traffic to search for unauthorized information transmissions. Host Based ILD&P systems run on end-user workstations to monitor and control access to physical devices and access information before it has been encrypted.
3. Right Answer: D Explanation: Information Leakage Detection and Prevention (ILD&P) is a computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders. Network ILD&P are gateway-based systems installed on the organization's internet network connection and analyze network traffic to search for unauthorized information transmissions. Host Based ILD&P systems run on end-user workstations to monitor and control access to physical devices and access information before it has been encrypted.
4. Right Answer: A Explanation: Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. Software is considered malware based on the intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software.
5. Right Answer: E Explanation: Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. Software is considered malware based on the intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, adware, and other malicious and unwanted software.
Leave a comment