Question 56
Which test is conducted to determine the incident recovery procedures effectiveness?
Question 57
Which of the following may be considered as insider threat(s):
Question 58
The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via e-mail could
be:
be:
Question 59
Contingency planning enables organizations to develop and maintain effective methods to handle
emergencies. Every organization will have its own specific requirements that the planning should address.
There are five major components of the IT contingency plan, namely supporting information, notification
activation, recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution
plan?
emergencies. Every organization will have its own specific requirements that the planning should address.
There are five major components of the IT contingency plan, namely supporting information, notification
activation, recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution
plan?
Question 60
What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP
addresses on a victim computer to identify the established connections on it:
addresses on a victim computer to identify the established connections on it:
