Question

Several users have reported that when attempting to save documents in team folders, the following message...

Several users have reported that when attempting to save documents in team folders, the following message is received: The File Cannot Be Copied or Moved – Service Unavailable. Upon further investigation, it is found that the syslog server is not obtaining log events from the file server to which the users are attempting to copy files. Which of the following is the MOST likely scenario causing these issues?

A. All the available space on the file server is consumed

B. The network is saturated, causing network congestion

C. Malicious processes are running on the file server

D. The file server is experiencing high CPU and memory utilization

-------------------------------------------------------------------------------------------------------

A cyber security analyst is adding input to the incident response communication plan. A company officer has suggested that if a data breach occurs, only affected parties should be notified to keep an incident from becoming a media headline. Which of the following should the analyst recommend to the company officer?

A. An externally hosted website should be prepared in advance to ensure that when an incident occurs victims have timely access to notifications from a non-compromised recourse

B.  The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.

C.  Guidance from laws and regulations should be considered when deciding who must be notified in order to avoid fines and judgements from non-compliance.

D.  The HR department should have information security personnel who are involved in the investigation of the incident sign non-disclosure agreements so the company cannot be held liable for customer data that might be viewed during an investigation

Expert reviews only. Please NO guessing or just internet searches. I want detailed explanation for me to learn my infosec course.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

for first question the correct option is B. The network is saturated, causing network congestion because of high number of request the server is not able to process every request and is having a fallback of not able to access the file and not being able to obtain the log event as well.

for second question the correct option is B.  The first responder should contact law enforcement upon confirmation of a security incident in order for a forensics team to preserve chain of custody.   because a data breach is a crime that involves stealing of data and the law enforcements should be informed as sooon as the incident is being discovered.

Add a comment
Know the answer?
Add Answer to:
Several users have reported that when attempting to save documents in team folders, the following message...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT