A company implemented an intrusion detection system. They notice the system generates a very large number of false alarms.
What steps should the company take to rectify this situation?
Answer : A
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?
A new employee is starting work at your company. When should they be informed of the company's security policy?
Answer : D
Your firewall blocked several machines on your network from connecting to a malicious IP address. After
reviewing the logs, the CSIRT discovers all Microsoft Windows machines on the network have been affected based on a newly published CVE.
Based on the IRP, what should be done immediately?
Answer : A
What must be included in the CMDB?
Answer : C
https://docs.servicenow.com/bundle/london-servicenow-platform/page/product/configurationmanagement/
concept/cnfig-mgmt-and-cmdb.html
Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external
stakeholders?
Answer : B
What is part of the Pre-Recovery phase?
Answer : B