(Solution) NIST defines a(n) ____ as "any observable occurrence in a system or network" 2.
1.
NIST defines a(n) ____ as “any observable occurrence in a system or network”
2.
The Public Relations Department helps InfoSec staff acquire personnel not already on hand to complete the CSIRT team.
A) True
B) False
3.
____ is the process of evaluating the circumstances around organizational events, determining which adverse events are possible incidents (incident candidates) and whether a particular adverse event constitutes an actual incident.
4.
The Incident Response Planning team (IRP team), should consist of individuals from all relevant constituent groups that will be affected by the actions of the frontline response teams
A) True
B) False
5.
A(n) ____ occurs when an incident that deserves attention is not reported.
6.
In an organization, unexpected activities occur periodically; these are referred to as ____.
7.
____ is a set of procedures that commence when an incident is detected.
8.
A(n) ____ is a detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event that might compromise information resources and assets.
9.
An example of a contradictory policy would be one that claims data security as a first priority and also requires complete privacy for all stakeholders.
A) True
B) False
10.
A(n) ____ is a sign that an adverse event is underway and has a probability of becoming an incident.
Solution details:
This attachment is locked
Our expert Writers have done this assignment before, you can reorder for a fresh, original and plagiarism-free copy and it will be redone much faster (Deadline assured. Flexible pricing. TurnItIn Report provided)
- Get this Solution
×
Please Enter your Email Address to receive the solution
×
Please Enter your Email Address to receive the solution
Get this solution for only:
$
Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
Name
:
Clas
s:
Dat
e:
Module 06 - IR: Detection Strategies
True / False
1. Gathering information on and identifying network assets is known as fingerprinting.
a. True
b. Fals
e
ANSWER: True
POINTS: 1
REFERENCES: p. 153
H2: Anatomy of an Attack—the “Kill Chain”
H1: Introduction
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJEC
TIVES:
6.1 - Identify the parts of a kill chain and how organizations can use it to
disrupt offensive operations
DATE CREATED: 9/20/2020 5:25 PM
DATE MODIFIED: 9/20/2020 5:26 PM
2. An indicator is an activity in progress that may signal an incident could occur in the future.
a. True
b. Fals
e
ANSWER: False
POINTS: 1
REFERENCES: p. 158
H1: INCIDENT INDICATORS
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: 6.2 - Define incidents that pose a risk to the organization
DATE CREATED: 9/20/2020 5:28 PM
DATE MODIFIED: 9/20/2020 5:28 PM
3. The Windows Task Manager can be used to review all processes on Microsoft Windows computers.
a. True
b. Fals
e
ANSWER: False
POINTS: 1
REFERENCES: H1: INCIDENT INDICATORS
H2: Detecting Incidents through Processes and Services
p. 164
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECT6.4 - Describe methods of detecting incidents by incident type
Copyright Cengage Learning. Powered by Cognero.Page 1