•
Question 42
____ is the process of examining, documenting, and assessing the security posture of an organization’s information technology and the risks it faces. •
Question 43
A CSIRT model that is effective for large organizations and for organizations with major computing resources at distant locations is the ____. •
Question 44
The CSIRT should be available for contact by anyone who discovers or suspects that an incident involving the organization has occurred. Some organizations prefer that employees contact a ____, which then makes the determination as to whether to contact the CSIRT or not. •
Question 45
Those services undertaken to prepare the organization or the CSIRT constituents to protect and secure systems in anticipation of problems, attacks, or other events are called ____. •
Question 46
The ____ flow of information needed from the CSIRT to organizational and IT/InfoSec management is a critical communication requirement. •
Question 47
The champion for the CSIRT may be the same person as the champion for the entire IR function—typically, the ____. •
Question 48