1. Right Answer: B
Explanation: Before reporting to senior management, affected customers or the authorities, the extent of the exposure needs to be assessed.
2. Right Answer: D
Explanation: When investigating a possible incident, it should first be validated. Running a port scan on the system, disabling the logon IDs and investigating the system logs may be required based on preliminary forensic investigation, but doing so as a first step may destroy the evidence.
3. Right Answer: B
Explanation: The criticality to business should always drive the decision. Regulatory requirements could be more flexible than business needs. The financial value of an asset could not correspond to its business value. While a consideration, IT resource availability is not a primary factor.
4. Right Answer: B
Explanation: Identifying the incident means verifying whether an incident has occurred and finding out more details about the incident. Once an incident has been confirmed(identified), the incident management team should limit further exposure. Determining the root cause takes place after the incident has been contained. Performing a vulnerability assessment takes place after the root cause of an incident has been determined, in order to find new vulnerabilities.
5. Right Answer: C
Explanation: The incident response process will determine the appropriate course of action. If the data have been corrupted by a hacker, the backup may also be corrupted.Shutting down the server is likely to destroy any forensic evidence that may exist and may be required by the investigation. Shutting down the network is a drastic action, especially if the hacker is no longer active on the network.