CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 35
____ is the process of examining, documenting, and assessing the
security posture of an organization’s information technology and the
risks it faces.
•
Question 43
A CSIRT model that is effective for large organizations and for
organizations with major computing resources at distant locations is
the ____.
•
Question 44
The CSIRT should be available for contact by anyone who discovers
or suspects that an incident involving the organization has occurred.
Some organizations prefer that employees contact a ____, which then
makes the determination as to whether to contact the CSIRT or not.
•
Question 45
Those services undertaken to prepare the organization or the CSIRT
constituents to protect and secure systems in anticipation of problems,
attacks, or other events are called ____.
•
Question 46
The ____ flow of information needed from the CSIRT to
organizational and IT/InfoSec management is a critical
communication requirement.
•
Question 47
The champion for the CSIRT may be the same person as the
champion for the entire IR function—typically, the ____.
•
Question 48
A key step in the ____ approach to incident response is to discover
the identify of the intruder while documenting his or her activity.
•
Question 49