100%(16)16 out of 16 people found this document helpful
This preview shows page 6 - 9 out of 15 pages.
Question 192 out of 2 pointsWhen reporting incidents, it is necessary to institute transparent procedures for filing incident reports. The process of the incident classification is known as triage. When triage is set in motion, the severity of the threat is assessed. For example, ___________________ occurs when there are a numbers of unauthorized scans, system probes, or vast virusesdetected; the event also necessitates manual intervention.Question 202 out of 2 points___________________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices.
Question 212 out of 2 pointsThe IRT report that is ultimately generated for executive management must be certain to educate all stakeholders regarding exploited risks. Which of the following items is notrequired to be addressed in the report?Question 222 out of 2 pointsIn order to assess policy compliance, many organizations will use a report card. The evaluation tools are comprised of criteria based on an organization’s requirements. Which of the following is not one the elements that would be included on a report card?Question 232 out of 2 pointsA baseline is a point of departure that guarantees that systems comply with security requirements when they are enacted. However, it is not an uncommon occurrence that systems are changed in a way that means they are no longer in compliance. Thus, it is necessary to use an accepted method to ensure that settings have not been changed. Which of the following is notone of these methods?Question 242 out of 2 points
A security _____________identifies a group of fundamental configurations designed to accomplish particular security objectives.Question 252 out of 2 pointsIt can be challenging for personnel in organizations to accept when significant changes are implemented. Consider this scenario: An organization implements a baseline of security systems that has caused certain applications that had previously worked well to suddenly fail. Which of the following steps will require time, patience, and an environment of cooperation that will best address the problem?