Question 7 2 out of 2 points The information security organization performs a

Question 7 2 out of 2 points the information security

This preview shows page 3 - 7 out of 20 pages.

Question 72 out of 2 pointsThe information security organization performs a significant role in the implementation of solutions that mitigate risk and control solutions. Because the security organization institutes the procedures and policies tobe executed, they occupy role of ____________________. Question 80 out of 2 pointsIn a business impact analysis (BIA), the phase of defining the business’s
Image of page 3
components and the component priorities, has several objectives. Which of the following is notone the objectives? Question 90 out of 2 pointsTo measure the effectiveness of the IRT, which of the following does notneed to be evaluated? Question 102 out of 2 pointsWhen reporting incidents, it is necessary to institute transparent procedures for filing incident reports. The process of the incident classification is known as triage. When triage is set in motion, the severity of the threat is assessed. For example, ___________________ occurs when there are a numbers of unauthorized scans, system probes, or vast virusesdetected; the event also necessitates manual intervention. Question 11
Image of page 4
2 out of 2 points In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that are ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted. Question 122 out of 2 pointsThe initial step in creating a business continuity and security response plan is a _________________, which can be used to assemble the business and security responses in order to diminish losses. Question 130 out of 2 pointsThe goal of conducting an incident analysis is to ascertain weakness. Because each incident is unique and might necessitate a distinct set of approaches, there is a range of steps that can be pursued to aid the analysis. One of these steps is to ________________, which entails mapping the network traffic according to the time of day and look for trends.
Image of page 5
Image of page 6
Image of page 7

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture