98%(221)216 out of 221 people found this document helpful
This preview shows page 13 - 17 out of 19 pages.
Question 362 out of 2 pointsThe National Security Information document EO 12356 explains the U.S. military classification scheme of top secret, secret data, confidential, sensitive but unclassified, and unclassified. Which of the following data can be reasonably expected to create serious damage to national security in the event that it was subject to unauthorized disclosure?Question 37
2 out of 2 pointsIn addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that are ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.Question 380 out of 2 pointsIn order to form an IRT, an organization is required to create a charter; this document identifies theauthority, mission, and goals of a committee or team, and there are a number of different types of IRT models for doing this. Which of the following models permits an IRT to have the complete authority to ensure a breach is contained?Question 392 out of 2 pointsAn organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations.
Question 400 out of 2 pointsWhen reporting incidents, it is necessary to institute transparent procedures for filing incident reports. The process of the incident classification is known as triage. When triage is set in motion, the severity of the threat is assessed. For example, ___________________ occurs when there are a numbers of unauthorized scans, system probes, or vast viruses detected; the event also necessitates manual intervention.Question 410 out of 2 pointsThe ____________________ identifies the processes entailed in the business continuity plan and/or the disaster recovery plan.Question 420 out of 2 pointsThe goal of conducting an incident analysis is to ascertain weakness. Because each incident is unique and might necessitate a distinct set of approaches, there is a range of steps that can be pursued to aid the analysis. One of these steps is to ________________, which entails mapping thenetwork traffic according to the time of day and look for trends.