CIS 359 Massive Success--snaptutorial.com

Page 63

Question 42

____ is the process of examining, documenting, and assessing the security posture of an organization’s information technology and the risks it faces. •

Question 43

A CSIRT model that is effective for large organizations and for organizations with major computing resources at distant locations is the ____. •

Question 44

The CSIRT should be available for contact by anyone who discovers or suspects that an incident involving the organization has occurred. Some organizations prefer that employees contact a ____, which then makes the determination as to whether to contact the CSIRT or not. •

Question 45

Those services undertaken to prepare the organization or the CSIRT constituents to protect and secure systems in anticipation of problems, attacks, or other events are called ____. •

Question 46

The ____ flow of information needed from the CSIRT to organizational and IT/InfoSec management is a critical communication requirement. •

Question 47

The champion for the CSIRT may be the same person as the champion for the entire IR function—typically, the ____. •

Question 48


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.