What is an example of monitoring the use of confidential data?
Move a file located on a file server
Lock the file that goes to an external USB device
Check the Firewall records for the access history.
Check the data by email from the organization
What is the purpose of the denial of service attacks?
To get files from a remote system
To tear down the system or the network.
Exploitation of weaknesses in the TCP / IP stack
Make Arojan using hidden actions
What is the main advantage of preventing network intrusions in the host?
Blocking threats before any file stored on the hard disk
Prevents the deprotected access system to protected resources.
Lock access to unauthorized or potentially dangerous websites.
Prevents safe systems from accessing deprotected resources
What is an example of a fan of rehabilitation with the participation of information security incidents?
The incidents move to the desktop security equipment, and then to the CISO.
The incidents go to an escalation of the equipment, and then the main group of incident response.
The levels of the first incident are based, then control and then blocked.
The incidents move the team to respond to the core incidents, and then to the scaling team.
What is the main task when creating a security policy?
To assist in the compliance process.
To ensure that the systems are updated patches.
To protect the information
Report on the configuration of the system.
The end user erroneously copied the confidential information in the email and tried to send it out of the company. Quarantine email and head directly to the user is notified with a description of disturbances. An additional notification is sent to IT security, and an investigation was launched. What describes this scenario?
Centralized reports on compliance.
Incident of the workflow
Modification of employee behavior.
Identification of confidential data.