Question 101
Qual Tech Solutions is a leading security services enterprise. Dickson works as an incident responder with this firm. He is performing a vulnerability assessment to identify the security problems in the network, using automated tools to identify the hosts, services, and vulnerabilities present in the enterprise network.
Based on the above scenario, identify the type of vulnerability assessment performed by Dickson.
Question 102
Which of the following is not a countermeasure to eradicate inappropriate usage incidents?
Question 103
A US Federal Agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to the agency's reporting timeframe guidelines, this incident should be reported within 2h of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate the activity.
Which incident category of US Federal Agency does this incident belong to?
Question 104
Incidents are reported in order to:
Question 105
___________________ record(s) user's typing.