1. An intentional or unintentional attempt to cause damage to or otherwise compromise information or
the systems that support it.
Correct Answer: Attack
2. Descriptions of typical attacks, including methodology, indicators of an attack, and broad
1. A detailed examination of the events that occurred from first detection to final recovery from an
Correct Answer: After-action review
2. Document containing contact information for the individuals that need to be notified in the event of