1) Curl Command to download the data from a internet site.
curl -k -O https://testserver.com.au/file.zip
1) Curl Command to download the data from a internet site.
curl -k -O https://testserver.com.au/file.zip
1) Create a wallet using below command
orapki wallet create -wallet client_wallet -auto_login -pwd "wallet password"
2) chmod 664 ewallet.p12
chmod 664 cwallet.sso
3) Convert jks file into wallet
orapki wallet jks_to_pcks12 -wallet client_wallet -pwd "wallet password" -keystore key.jks -jkspwd "wallet password"
1. Which law or regulation requires government agencies and other organizations that operate systems on behalf of government agencies to create an incident response plan?
Ans : FISMA (Federal Information Security Management Act of 2002)
2. You are working as a cybersecurity analyst in a Security Operations Center. You received an alert from your SIEM that a workstation might be infected with a piece of malware. Which phase of the incident response lifecycle would you be in when this occurs?
Ans : Detection and Analysis
3. Which of the following NIST Special Publications is titled as the Computer Security Incident Handling Guide?
Ans : SP 800-61
4. Which of these is included in a policy?
Ans : objectives
5. Which of these is included in a plan?
Ans : measurements and metrics
6. Which of these is included in a procedure?
Ans : forms
7. Which structure would allow an organization to hire a managed security service provider (MSSP) to conduct their 24/7 monitoring but would still rely on the organization’s own employees to conduct an incident response if a serious breach was detected?
Ans : a partially outsourced model
8. Which role is responsible for the overall success or failure of the technical portions of an incident response?
Ans : team leader
9. Which incident response team member is primarily focused on the creation of an event timeline to show what occurred leading up to the incident?
Ans: forensic analyst
10. Which organization type require an incident responder to send an information request through their manager prior to sending it to an analyst in the human resources department?
Ans : a vertical organization
11. One of your incident response team members is planning to attend the BlackHat information security conference next month and wants to exchange some of the lessons learned from your organization’s latest incident response efforts with a forensic analyst they know at another company. Which type of coordinating relationship best describes this information exchange?
Ans : team to team
12. Which of these is not considered an indicator that could be used during your technical analysis?
Ans : news articles about an incident
13. Which of these is a consideration when asking contract personnel to come in after working hours for an incident, but is not a major consideration when dealing with your own organizational employees?
Ans : incurring additional labor coverages and costs
14. Which type of technical resource could be used to identify if a Windows system file has been modified?
Ans : cryptographic hash
15. Which of these is not considered a method of preventing future incidents?
Ans : Remove a Remote Access Trojan from the organization’s server.
16. Which attack vector would be used to properly categorize a password spraying attack?
Ans : attrition-based
17. Which type of indicator of compromise would best represent the vulnerability and exploit data contained within the Common Vulnerabilities and Exposures database?
Ans : public information
18. Which of these is a prioritization category that is used to measure the effect on the confidentiality, integrity, or availability of an organization’s network or servers?
Ans : information impact
19. Which containment strategy involves disconnecting an infected host from the network to prevent the spread of malware?
Ans : isolation
20. Based on the order of volatility, which type of evidence should be collected first?
Ans : swap files
21. Which of these is not considered a recovery action during an incident response?
Ans : Collect evidence from the affected system.
22. When creating your evidence retention policy, which factor would prevent you from retaining data and evidence for an indefinite amount of time?
Ans : the size of the organization’s budget for data retention
23. What is the most important thing to do during a "Lessons Learned" workshop to get valuable feedback from everyone?
Ans : Avoid assigning blame to anyone.
24. Which of these is not a typical measure or metric collected by the incident handling and incident response team?
Ans : average salary of your incident responders
1) Transition sets the benchmark by which the client provider relationship is initially measured.
True
False
2) Successful transitions result in better business outcomes only for the Enterprise (Customer) and not to the provider in the long run.
False
True
3) Well-executed transition enables customers to unlock value from outsourcing initiative in quickest possible time.
True
False
4) Transition does not estimate the costs, timing, resources and risks associated with a service.
True
False
5) Transition is new or changed service that satisfies the needs of the customer.
True
False
6) A hostile transition in IT can be defined as when you take over knowledge from another external provider and then in a second step, the responsibility to deliver the work is transferred to us.
True
False
7) Which of the below statement defines the Knowledge Acquisition phase of the Transition?
Understand the existing environment,process ,service scope
Hands on experince with actual env with limited scope
Handle the services in scope with minimal to no support
Satbilizes the environment and try to achieve the target SLAs/KPIs
Provide service independently to SLA and strive for continous improvement
8) Which of the below statement defines the Secondary Support of the Transition?
Understand the existing environment,process ,service scope
Hands on experince with actual env with limited scope
Handle the services in scope with minimal to no support
Satbilizes the environment and try to achieve the target SLAs/KPIs
Provide service independently to SLA and strive for continous improvement
9) Which of the below statement defines the Primary Support phase of the Transition?
Understand the existing environment,process ,service scope
Hands on experince with actual env with limited scope
Handle the services in scope with minimal to no support
Satbilizes the environment and try to achieve the target SLAs/KPIs
Provide service independently to SLA and strive for continous improvement
10) Which of the below statement defines the Stabilization phase of the Transition?
Understand the existing environment,process ,service scope
Hands on experince with actual env with limited scope
Handle the services in scope with minimal to no support
Satbilizes the environment and try to achieve the target SLAs/KPIs
Provide service independently to SLA and strive for continous improvement
11) Which of the below statement defines the Steady phase of the Transition?
Understand the existing environment,process ,service scope
Hands on experince with actual env with limited scope
Handle the services in scope with minimal to no support
Satbilizes the environment and try to achieve the target SLAs/KPIs
Provide service independently to SLA and strive for continous improvement
12) Which of the below tools/applications is used to create and maintain the transition plan?
Service Acquisition Manager (SAM) & Microsoft Project Plan (MPP )
Microsoft Project Plan (MPP )
13) Which of the below features are present in the SAM tool? -- All
I. Plan and Track the Transition
II. Import/Export Reports
III. Task Dependency Mapping
IV. Milestone Alerts/Report Scheduler
14) Which of the below transition scenarios aligns with scale and complexity?
Transition from mutiple Geographies for DC
15) Which of the below tools/applications is a one-stop shop which provides the details of the past and present transitions?
Transition Program Log (TPL)
Contractual Commitments Risk Tracker (CCRT)
Service Acquisition Manager (SAM)
Microsoft Project Plan (MPP )
16) Staff Attrition is a key element during the transition from the in-house customer team.
True
False
17) Personal development and team management is the responsibility of Transition Lead, Manager and Director.
True
False
18) Transparency to the customer helps in successful transition.
True
False
19) Team Building exercise within Company and Client Associates is one of the best practices during the transition.
True
False
20) Which of these are not the focus areas of Transition?
Automation
21) Which one of the below option is related to Rigor in Transition (RIT)?
Ensure that all exisitng operational tools and processes are transitionioned and details are documented
22) Quality gates and Acceptance criteria are not related to each other.
False
True
23) Toll Gates are applicable for all the phases of Transition.
True
False
24) Which one of the below Acceptance criteria is related to Pre Secondary Support Quality gate?
RAID Log
25) What is the possible mitigation plan when there is a delay in getting the ODC and network connectivity during the transition?
connect through alternative vpn
26) Transition Governance/Review takes place in 3 levels to achieve smooth and risk free transition.
True
False
Concepts
------------
ETVX Model and Phases - Entry,Task, validation, exit
Transitional plannin (ETVX) -- First Phase
Knowledge Acquisition (ETVX) -- Second Phase
Secondary Support (ETVX) Third Phase
Primary Support (ETVX) Fourth Phase
Stabilization (ETVX) Fifth Phase
Steady State (ETVX) Fifth Phase
The following tools and applications will be used during a transition:
Service Acquisition Manager (SAM) -- Plan and track, Reports, Import/ Export, Trackers, Acceptance Criteria and Dependecies, Task Dependecies feature, Report Scheduler
Microsoft Project Plan (MPP ) -- Task administration, resource management, Transition scheduling and tracking , Reporting
Phases : startup, Initition, transition execution, closing the transition
Task administration -- Task, summary task, milestone administration
Contractual Commitments Risk Tracker (CCRT) --
Contract Commitment Tracker is a very useful asset that helps the engagements to track the commitment clauses, specified in the customer contracts, MSAs, SOWs and so on. This tracker enables the project to capture the commitment against the following parameters, apart from other additional commitments.
Transition Program Log (TPL) --
To Run SQL Commands'
tnsping TestDB
to check whether database available
1) To Connect as admin from SQL Plus
Sample: sqlplus username/password@TestDB AS SYSDBA