True or False: Change requests are generated only when there’s room for improvement in a process.
Correct
Incorrect
Question 2 of 18
2. Question
What document captures the need or reasons for change and the procedure for implementing the change in a formal change management process?
Correct
Incorrect
Question 3 of 18
3. Question
Who might consider a normal or minor Request for Change (RFC)?
Correct
Incorrect
Question 4 of 18
4. Question
True or False: A hot site is an empty building with a lease agreement in place to install whatever equipment is required when necessary.
Correct
Incorrect
Question 5 of 18
5. Question
What is failover in terms of site resiliency?
Correct
Incorrect
Question 6 of 18
6. Question
What type of site might always be available and in use?
Correct
Incorrect
Question 7 of 18
7. Question
True or False: In defense in depth, the attacker must get past multiple security controls to fully compromise a system.
Correct
Incorrect
Question 8 of 18
8. Question
What does technology diversity refer to?
Correct
Incorrect
Question 9 of 18
9. Question
What is the advantage of vendor diversity?Â
Correct
Incorrect
Question 10 of 18
10. Question
True or False: A honeypot is a computer system set up to attract threat actors.
Correct
Incorrect
Question 11 of 18
11. Question
What does a DNS sinkhole do in a disruption strategy?
Correct
Incorrect
Question 12 of 18
12. Question
What is the main goal of disruption strategies?
Correct
Incorrect
Question 13 of 18
13. Question
True or False: Passwords should be stored in a reversible format to improve security.
Correct
Incorrect
Question 14 of 18
14. Question
What does MFA stand for in the context of access control?
Correct
Incorrect
Question 15 of 18
15. Question
In the principle of least privilege, users should have:
Correct
Incorrect
Question 16 of 18
16. Question
True or False: A Security Operations Center (SOC) is a centralized unit that deals with security issues and incidents.
Correct
Incorrect
Question 17 of 18
17. Question
What is the primary function of a Security Information and Event Management (SIEM) system?
Correct
Incorrect
Question 18 of 18
18. Question
Incident response can be broken down into which of the following phases?
Correct
Incorrect
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.