91%(112)102 out of 112 people found this document helpful
This preview shows page 11 - 15 out of 18 pages.
Question 301 out of 1 pointsWhich of the following collects and provides reports on failed login attempts, probes, scans,denial-of-service attacks, and detected malware?Question 311 out of 1 pointsThe last stage of a business impact analysis is prioritizing the resources associated with the ____,which brings a better understanding of what must be recovered first.Question 321 out of 1 pointsThe final component to the CPMT planning process is to deal with ____.
Question 331 out of 1 pointsThe ____ job functions and organizational roles focus on protecting the organization’sinformation systems and stored information from attacks.Question 341 out of 1 pointsA(n) ____ is a detailed examination of the events that occurred, from first detection of anincident to final recovery.Question 351 out of 1 pointsIncident analysis resources include network diagrams and lists of ____, such as database servers.
Question 361 out of 1 pointsThe U.S. National Institute of Standards and Technology recommends a set of tools for theCSIRT including incident reporting mechanisms with which users can report suspected incidents.At least one of these mechanisms should permit people to report incidents ____.Question 371 out of 1 pointsA(n) ____ is a CSIRT team member, other than the team leader, who is currently performing theresponsibilities of the team leader in scanning the organization’s information infrastructure forsigns of an incident.Question 381 out of 1 points
____ is the process of systematically examining information assets for evidentiary material thatcan provide insight into how an incident transpired.