The windows task manager can be used to seek out trojan


Question 1
A(n) ____ is the process of accounting for all personnel-that is, determining each individual's whereabouts-during an emergency.
a. team leader count
b. employee count
c. head count
d. personnel count

Question 2

The ____ handles computer crimes that are categorized as felonies.
a. FBI
b. U.S. Treasury Department
c. U.S. Secret Service
d. Department of Defense

Question 3
The term ____________________ refers to attempts by insiders to escalate their privileges and access information and other assets they do not explicitly have authorization for.

Question 4
Giving the IR team the responsibility for ____ is generally not recommended.
a. vulnerability assessment
b. incident analysis
c. patch management
d. advisory distribution

Question 5
The Windows Task Manager can be used to seek out Trojan programs on Microsoft Windows computers.
True
False

Question 6
There are several national training programs that focus on incident response tools and techniques.
True
False

Question 7
A final IR plan should be tested at least ____________________ by performing at least a structured walk-through test and a more realistic type of test, when possible.

Question 8
A ____ is a description of the disasters that may befall an organization, along with information on their probability of occurrence, a brief description of the organization's actions to prepare for that disaster, and the best case, worst case, and most likely case outcomes of the disaster.
a. disaster scenario
b. disaster policy
c. disaster follow-up
d. disaster outline

Question 9
____________________ testing can include employees conducting self-assessments after an exercise by completing feedback surveys indicating what they thought worked well and what did not.

Question 10
An asset can be logical, such as a Web site, information, or data; or an asset can be physical, such as a person, computer system, or other tangible object.
True
False

Question 11
A(n) ____ is a sign that an adverse event is underway and has a probability of becoming an incident.
a. precursor
b. signal
c. indication
d. inactive system

Solution Preview :

Prepared by a verified Expert
Computer Engineering: The windows task manager can be used to seek out trojan
Reference No:- TGS02519809

Now Priced at $10 (50% Discount)

Recommended (97%)

Rated (4.9/5)