Question 31

Which of the following is an incident tracking, reporting and handling tool:
  • Question 32

    Except for some common roles, the roles in an IRT are distinct for every organization. Which among the
    following is the role played by the Incident Coordinator of an IRT?
  • Question 33

    The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for further investigations of the incident. Identify the stage of the incident response and handling process in which complete backup of the infected system is carried out?
  • Question 34

    They type of attack that prevents the authorized users to access networks, systems, or applications by exhausting the network resources and sending illegal requests to an application is known as:
  • Question 35

    An assault on system security that is derived from an intelligent threat is called: