Jiandikishe sasa

Ingia

Nenosiri lililopotea

Umepoteza nywila yako? Tafadhali ingiza anwani yako ya barua pepe. Utapokea kiunga na utaunda nywila mpya kupitia barua pepe.

Ongeza chapisho

Lazima uingie ili kuongeza chapisho .

Ongeza swali

Lazima uingie ili kuuliza swali.

Ingia

Jiandikishe sasa

Karibu kwenye Scholarsark.com! Usajili wako utakupa ufikiaji wa kutumia huduma zaidi za jukwaa hili. Unaweza kuuliza maswali, toa michango au toa majibu, angalia maelezo mafupi ya watumiaji wengine na mengi zaidi. Jiandikishe sasa!

CISM Incident Management Answer and Certified Practice Exam

CISM Incident Management Answer and Certified Practice Exam

Bei: $94.99

Maswali ya Mfano

mwangaza) Which of the following is an example of a correction control?

a) Redirect incoming traffic to respond to a denial of service (Kutoka) mashambulizi

b) Filtering network traffic to the internal network based on

c) Check the incoming network traffic for viruses

d) Log incoming network traffic

e) Hakuna

mwangaza) In order to determine how the security breach occurred in the company’s network, pay attention to safety in the storage of different devices. Which of the following best Facilitates correlation and review of these magazines?

a) Database ~~ POS = TRUNC server ~~ POS = HEAD COMP

b) Domain Name Server (DNS)

c) time server

d) proxy

e) Hakuna

mwangaza) The organization had a number of attacks on the network that everyone seems to have originated inside. The best approach is to:

a) It requires the use of strong passwords.

b) assign a static IP-address.

c) centralized logging software support.

d) installing an intrusion detection system (Vitambulisho).

e) Hakuna

mwangaza) A serious vulnerability has been reported in the firewall software that is used by the organization. Which of the following factors should be immediate measures for information security management?

a) Make sure that all OS patches are updated

b) Block inbound traffic until a suitable solution is not found

c) Get advice from your firewall manufacturer

d) Order penetration test

e) Hakuna

Kuhusu arkadmin

Acha jibu