Page 684 - StudyBook.pdf
P. 684
668 Chapter 11 • Operational and Organizational Security: Incident Response
A. Any data on the computer’s hard disk that may be modified.
B. Fingerprints, fibers, and other traditional forensic evidence.
C. Data stored in the computer’s memory
D. Any evidence stored on floppy or other removable disk
11. You are assessing risks and determining which policies to protect assets will be
created first.Another member of the IT staff has provided you with a list of
assets, which have importance weighted on a scale of 1 to 10. Internet con-
nectivity has an importance of 8, data has an importance of 9, personnel have
an importance of 7, and software has an importance of 5. Based on these
weights, what is the order in which you will generate new policies?
A. Internet policy, Data Security policy, Personnel Safety policy, Software
policy.
B. Data Security policy, Internet policy, Software policy, Personnel Safety
policy.
C. Software policy, Personnel Safety policy, Internet policy, Data Security
policy.
D. Data Security policy, Internet policy, Personnel Safety policy, Software
policy.
12. You are researching the ARO, and need to find specific data that can be used
for risk assessment.Which of the following will you use to find information?
A. Insurance companies
B. Stockbrokers
C. Manuals included with software and equipment
D. None of the above.There is no way to accurately predict the ARO.
13. You are compiling estimates on how much money the company could lose if
a risk actually occurred one time in the future.Which of the following would
these amounts represent?
www.syngress.com