Dell EMC DES-9131 Specialist - Infrastructure Security, Version 1.0 Exam Practice Test

Page: 1 / 14
Total 60 questions
Question 1

When should event analysis be performed?



Answer : B


Question 2

What process is used to identify an organization's physical, digital, and human resource, as required in their Business Impact Analysis?



Answer : D


Question 3

The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH

scenario. This action is being executed in which function?



Answer : A


Question 4

The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?



Question 5

An Internet-connected file server compromised by a threat that leaked all dat



Answer : C


Question 6

The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.

Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.

Which actions should you take to stop data leakage and comply with requirements of the company security policy?



Answer : C


Question 7

A company suffers a data breach and determines that the threat actors stole or compromised 10,000 user

profiles. The company had planned for such a breach and determined the loss would be around $2 million.

Soon after restoration, the company stock suffered a 30% drop and the loss was nearly $20 million. In addition, the company received negative press.

Which area of risk did the business forget to account for?



Answer : A


Page:    1 / 14   
Total 60 questions