97%(92)89 out of 92 people found this document helpful
This preview shows page 2 - 4 out of 6 pages.
Question 55.00000 out of 5.00000 pointsAn occurrence that transgresses an organization’s security policies is known as an incident. Which of the following is notan example of a security incident?Selected Answer:a server crash that was accidentally causedAnswers:non-permitted access to any computer systema server crash that was accidentally causedduplicating customer information derived from a databasenon-permitted use of computer systems for purpose of gamingQuestion 65.00000 out of 5.00000 pointsIt is important to conduct a nearly continuous evaluation of possible ______________ to guarantee that recovery estimates provided to customers are accurate and maintain credibility with customers.Question 75.00000 out of 5.00000 points___________________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices.
Question 85.00000 out of 5.00000 pointsThe initial step in creating a business continuity and security response plan is a _________________, which can be used to assemble the businessand security responses in order to diminish losses.Question 95.00000 out of 5.00000 pointsOf all the team members on the IRT, management plays a fundamentalrole in decision-making because it gives approval to the charter, response policy, staffing, and budget.Selected Answer:TrueAnswers:TrueFalse