00:00

QUESTION 16

An active vulnerability scanner featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis is called:

Correct Answer: A

QUESTION 17

Which test is conducted to determine the incident recovery procedures effectiveness?

Correct Answer: A

QUESTION 18

An adversary attacks the information resources to gain undue advantage is called:

Correct Answer: B

QUESTION 19

Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the infected hosts from the information system?

Correct Answer: B

QUESTION 20

If the loss anticipated is greater than the agreed upon threshold; the organization will:

Correct Answer: B