97%(39)38 out of 39 people found this document helpful
This preview shows page 2 - 4 out of 6 pages.
non-permitted use of computer systems for purpose of gaming5 points Question 51.An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations.incident response team (IRT)business impact analysis team (BIAT)disaster recovery plan team (DRPT)information technology subject matter experts (ITSME)5 points Question 61.As one of the most vital actions performed in an organization, the risk assessment delimits vulnerabilities and threats as well as recommendations for controls.TrueFalse5 points Question 71.Because incidents can eventually become court cases, it is necessary that the actions of the IRT demonstrate due care, which requires steps or actions are taken to mitigate harm to another party.TrueFalse
5 points Question 81.Following an outage or disruption of services, consult the BCP for a blueprint for establishing the continuity of business operations.TrueFalse5 points Question 91.For the sake of protection during a lawsuit, it is advised that a company creates a retention policy that delineates how data is regularly classified, deleted, and retained. Such a policy illustrates “good faith.”TrueFalse5 points Question 101.If a vulnerability is not fixed at the root cause, there is a possibility thatanother route of attack can emerge. This route is known as the