Question 1 1 out of 1 pointsThe U.S. National Institute of Standards and Technology recommends a set of tools for the CSIRT including incident reporting mechanisms with which users can report suspected incidents.At least one of these mechanisms should permit people to report incidents ____. Question 2 1 out of 1 pointsThe training delivery method with the lowest cost to the organization is ____.
Question 3 1 out of 1 pointsGeneral users require training on the technical details of how to do their jobs securely, including good security practices, ____ management, specialized access controls, and violation reporting. Question 4 1 out of 1 pointsShould an incident begin to escalate, the CSIRT team leader continues to add resources and skill sets as necessary to attempt to contain and terminate the incident. The resulting team is called the____ for this particular incident.
Question 5 1 out of 1 pointsThe responsibility for creating an organization’s IR plan often falls to the ____. Question 6 1 out of 1 pointsIncident analysis resources include network diagrams and lists of ____, such as database servers.
Question 7 1 out of 1 points____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired. Question 8 1 out of 1 pointsOne of the primary responsibilities of the IRP team is to ensure that the ____ is prepared to respond to each incident it may face.
Question 9 0 out of 1 points____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations. Question 10 1 out of 1 points____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable
You've reached the end of your free preview.
Want to read all 27 pages?
- Summer '14