Page 682 - StudyBook.pdf
P. 682

666    Chapter 11 • Operational and Organizational Security: Incident Response

                  A. Replace all of the Apple computers with PCs running Windows

                  B. Enable password protection on servers
                  C. Enable password protection on workstation screensavers
                  D. Provide front desk computers with Internet access, so they can update
                      anti-virus software with the latest signature files

              5. A problem with the air conditioning is causing fluctuations in temperature in
                  the server room.The temperature is rising to 90 degrees when the air condi-
                  tioner stops working for a time, and then drops to 60 degrees when you get
                  the air conditioner working again.The problem keeps occurring so that the
                  raising and lowering of temperature keeps occurring over the next two days.
                  What problems may result from these fluctuations?

                  A. ESD
                  B. Biometrics
                  C. Chip creep

                  D. Poor air quality

              6. A server has been compromised by a hacker who used it to send spam mes-
                  sages to thousands of people on the Internet.A member of the IT staff
                  noticed the problem while monitoring network and server performance over
                  the weekend, and has noticed that several windows are open on the server’s
                  monitor. He also notices that a program he is unfamiliar with is running on
                  the computer. He has called you for instructions as to what he should do
                  next.Which of the following will you tell him to do immediately?
                  A. Shut down the server to prevent the hacker from using the server further
                  B. Reboot the server to disconnect the hacker from the machine and using
                      the server further

                  C. Document what appears on the screen
                  D. Call the police

              7. You are at a crime scene working on a computer that was hacked over the
                  Internet.You’re concerned that a malicious program may have been installed
                  on the machine that will result in data being damaged or destroyed if the
                  computer is shut down or restarted.Which of the following tasks will you
                  perform to deal with this possibility?




          www.syngress.com
   677   678   679   680   681   682   683   684   685   686   687