100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ECIHv2 Practice Questions and Answers 2024

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
04-09-2024
Written in
2024/2025

ECIHv2 Practice Questions and Answers 2024

Institution
ECIHv2
Course
ECIHv2

Content preview

1



ECIHv2 Practice Questions and Answers 2024
Which element of information security includes the trustworthiness of data or resources
in terms of preventing improper or unauthorized changes?

a.) Confidentiality
b.) Authenticity
c.) Availability
d.) Integrity -Answer- B

is a security strategy in which several protection layers are placed
throughout an information system.

a.) Defense-in-depth
b.) Non-repudiation
c.) Information security
d.) Offense-in-depth -Answer- A

Security policies are the foundation of the security infrastructure that defines the basic
security requirements and rules to be implemented in order to protect and secure an
organization's information systems. Which of the following is NOT something security
policies can accomplish?

a.) They reduce or eliminate legal liability of employees and third parties
b.) They protect confidential and proprietary information from theft, misuses,
unauthorized disclosure, or modification
c.) They prevent wastage of the company's computing resources
d.) They can still be effective when added as an afterthought -Answer- D

Anna created her company's security policy to accept the majority of internet traffic,
excluding several known dangerous services and attacks. Which type of security policy
did Anna put into place?

a.) Permissive Policy
b.) Promiscuous Policy
c.) Prudent Policy
d.) Paranoid Policy -Answer- A

A(n) policy defines a standard to handle application traffic, such as web
or email.

a.) Remote access
b.) Network connection
c.) Firewall management
d.) Access control -Answer- C


1

,2


What kind of policy contains a set of rules that defines authorized connections?

a.) User account
b.) Special access
c.) Remote access
d.) Password -Answer- C

Motive (Goal) + Method + Vulnerability =

a.) Security policy
b.) Attacks
c.) Defense-in-depth
d.) Access control -Answer- B

Dwayne wants to acquire account information from a competitor company, so he sends
an illegitimate email to the Payroll Specialist claiming to be the CEO. What type of
security attack would this be?

a.) IoT threats
b.) Web application threats
c.) Phishing
d.) Ransomware -Answer- C

Spoofing, Session Hijacking, DoS Attacks, Firewall and IDS Attacks are all considered
what type of information security threat?

a.) Network threat
b.) Application threat
c.) Host threat
d.) System threat -Answer- A

Which of the following is NOT a common cause for system vulnerabilities?

a.) Software bugs
b.) Strong passwords
c.) Use of broken algorithms
d.) Complexity of the system -Answer- B

Which phase of the risk management process includes a strategical approach to
prepare for handling risks and reduce its impact on organizations? This phase
addresses and treats the risk according to their severity level.

a.) Risk assessment
b.) Risk mitigation
c.) Risk management plan evaluation
d.) Risk determination -Answer- B


2

, 3



Abiding laws are important while dealing with the incident since an organization can
face legal issues if it does not maintain legality while dealing with security incidents.
Sometimes, incident handling also involves investigating private information of
individuals, which hampers their right to privacy. Which legal compliance act protects
this type of information?

a.) Health Insurance Portability and Accountability Act (HIPAA)
b.) Occupational Safety and Health (OSHA)
c.) Resource Conversation and Recovery Act (RCRA)
d.) Freedom of Information Act (FOIA) -Answer- A

There are several different phases of IH&R. In the phase, the incident
information will be informed to various stakeholders, including management, third-party
vendors, and clients.

a.) Containment
b.) Notification
c.) Forensic analysis
d.) Incident triage -Answer- B

Documentation, Impact Assessment, and Incident Disclosure are all part of which step?

a.) Step 6: Evidence Gathering
b.) Step 7: Eradication
c.) Step 8: Recovery
d.) Step 9: Post-Incident Activities -Answer- D

John is creating a statement that reflects his organization's mid=term and long-term
goals for incident management capabilities. What type of statement is he creating?

a.) Vision statement
b.) Mission statement
c.) Declarative statement
d.) Imperative statement -Answer- A

When dealing with IH&R it is important to determine the fundind.) Proceduresg
requirements based on empirical assumptions of various components. Which of the
following is NOT considered an IH&R component that incurs cost?

a.) Space
b.) Team staffing
c.) Toolkits
d.) Procedures -Answer- D




3

Written for

Institution
ECIHv2
Course
ECIHv2

Document information

Uploaded on
September 4, 2024
Number of pages
20
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorExpert West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
484
Member since
3 year
Number of followers
313
Documents
8621
Last sold
9 hours ago

Expertise in Nursing, Biochemistry, Mathematics, Psychology, Biology, History etc. My Work contains the latest, updated Exam Solutions, Study Guides.100% verified & Guarantee Top Grades Attained.

3.7

63 reviews

5
27
4
12
3
11
2
2
1
11

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions