(TCOs 1, 2, 4) Objects, persons, or other entities that pose a potential risk of loss to an asset are called _____.
- (TCOs 1, 2, 4) Objects, persons, or other entities that pose a potential risk of loss to an asset are called _____.
- TCOs 1, 2, 4) The process of assigning a risk rating or score to an information asset is called _____.
- (TCOs 1, 2, 4) Which part of the contingency plan provides detailed scenarios of the potential impact of each type of attack?
- (TCOs 1, 2, 4) Which is not a role of the contingency planning management team?
- (TCOs 1, 2, 4) Who should set the policy for the contingency planning process?
- (TCOs 1, 2, 4) The analysis of business _____ focuses on identifying which are the main revenue-producing operations.
- (TCOs 3, 5) Which of the following is not a possible IR team structure model?
- (TCOs 3, 5) The circumstances that cause the IR plan to be initiated are called the _____.
- (TCOs 3, 5) Which type of plan testing involves individuals who act as if an incident has occurred, but do so without interfering with normal operations?
- (TCOs 3, 5) Legitimate activities wrongly reported as incident candidates are referred to as _____.
- (TCOs 3, 5) The _____ should provide the incident response plan as its first deliverable.
- (TCOs 3, 5) The successful execution of a _____ begins with admitting that there is a problem.
- (TCOs 3, 5) _____ reflect upon the relative security of an information system
- (TCOs 3, 5) Which of the following describes confidentiality?
- (TCO 1) The CNSS model of _____ evolved from a concept known as the CIA triangle.
(TCOs 3, 5) There is nothing that _____ can do to improve the bottom line
TCO 1) Which of the following can become the basis for an attack on information?
(TCOs 2, 4) The _____ takes up where the risk assessment process leaves off.
(TCO 5) When a non-event is categorized as an actual incident, it is also known as a _____.
(TCO 5) False positives or noise often result from which of the following causes in an incident collection candidate?