Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
________ of response is critical.A) Accuracy
B) Speed
C) Both A and B
D) Neither A nor B
Answer
This answer is hidden. It contains 1 characters.
Related questions
Q:
________ is the act of actually stopping an incident's damage.
A) Disconnection
B) Gapping
C) Containment
D) Termination
Q:
________ allows a response team to determine an incident's damage potential and to gather information needed to begin containment and recovery.
A) Detection
B) Analysis
C) Both A and B
D) Neither A nor B
Q:
Live tests are ________.
A) more effective than walkthroughs
B) inexpensive
C) Both A and B
D) Neither A nor B
Q:
A walkthrough is also called a ________.
A) table-top exercise
B) live test
C) Both A and B
D) Neither A nor B
Q:
A CSIRT should not include members from the legal department.
Q:
Successful attacks are commonly called ________.
A) security incidents
B) countermeasures
C) Both A and B
D) Neither A nor B
Q:
Wal-Mart was able to respond to hurricane Katrina so quickly because it had ________.
A) detailed business continuity plans
B) a full-time director of business continuity
C) Both A and B
D) Neither A nor B
Q:
Hot sites ________.
A) are more expensive than CDP
B) Lose less data during a disaster than CDP
C) Both A and B
D) Neither A nor B
Q:
A router can be a NIDS.
Q:
In ________ transfers, each event's data goes to the manager immediately.
A) batch
B) real-time
C) Both A and B
D) Neither A nor B
Q:
A ________ IDS sends data from many devices at a central management console.
A) centralized
B) distributed
C) fragmented
D) decentralized
Q:
18 U.S.C. 2511 prohibits ________.
A) the interception of electronic messages
B) hacking
C) Both A and B
D) Neither A nor B
Q:
18 U.S.C. 1030 protects ________.
A) all computers
B) "protected computers" such as government computers
C) Both A and B
D) Neither A nor B
Q:
18 U.S.C. 1030 prohibits ________.
A) hacking
B) malware attacks
C) denial-of-service attacks
D) All of the above
Q:
Courts will often admit unreliable evidence if judges believe that juries can be trusted to evaluate it properly.
Q:
The prosecutor must demonstrate ________ at the time of the action at the center of a criminal trial.
A) reasonable doubt
B) mens rea
C) Both A and B
D) Neither A nor B
Q:
________ deals with the violation of criminal statutes.
A) Criminal law
B) Civil law
C) Both A and B
D) Neither A nor B
Q:
Black holing is an effective long-term containment solution.
Q:
Disconnection ________.
A) is the most decisive way to do termination
B) harms legitimate users
C) Both A and B
D) Neither A nor B
Q:
After wiping/clearing, data is ________.
A) recoverable
B) reusable
C) Both A and B
D) Neither A nor B
Q:
One of the most often overlooked mechanisms used to reduce data loss is employee training.
Q:
Companies address the risk of losing a security key by using ________.
A) encryption key resets
B) key escrow
C) Both A and B
D) Neither A nor B
Q:
DML triggers are used to ________.
A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B
D) Neither A nor B
Q:
Retaining data can create negative consequences.
Q:
From a legal standpoint, loss of encrypted data comes with negligible risk from the loss private information.
Q:
Who should be involved in the creation of retention policies?
A) Business units
B) The legal department
C) Both A and B
D) Neither A nor B
Q:
Backup media should be encrypted.
Q:
With RAID 5, the following is achieved ________.
A) Parity
B) Striping
C) Redundancy
D) All of the above
Q:
Optical disks can safely hold data for decades.
Q:
Mesh backup is where client PCs in an organization back up each other.