Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
Which of the following is one of the four steps in business process analysis?A) Specifying resource needs
B) Prioritizing business processes
C) Both A and B
D) Neither A nor B
Answer
This answer is hidden. It contains 1 characters.
Related questions
Q:
________ is the act of actually stopping an incident's damage.
A) Disconnection
B) Gapping
C) Containment
D) Termination
Q:
________ allows a response team to determine an incident's damage potential and to gather information needed to begin containment and recovery.
A) Detection
B) Analysis
C) Both A and B
D) Neither A nor B
Q:
Live tests are ________.
A) more effective than walkthroughs
B) inexpensive
C) Both A and B
D) Neither A nor B
Q:
A walkthrough is also called a ________.
A) table-top exercise
B) live test
C) Both A and B
D) Neither A nor B
Q:
A CSIRT should not include members from the legal department.
Q:
Successful attacks are commonly called ________.
A) security incidents
B) countermeasures
C) Both A and B
D) Neither A nor B
Q:
Wal-Mart was able to respond to hurricane Katrina so quickly because it had ________.
A) detailed business continuity plans
B) a full-time director of business continuity
C) Both A and B
D) Neither A nor B
Q:
Hot sites ________.
A) are more expensive than CDP
B) Lose less data during a disaster than CDP
C) Both A and B
D) Neither A nor B
Q:
A router can be a NIDS.
Q:
In ________ transfers, each event's data goes to the manager immediately.
A) batch
B) real-time
C) Both A and B
D) Neither A nor B
Q:
A ________ IDS sends data from many devices at a central management console.
A) centralized
B) distributed
C) fragmented
D) decentralized
Q:
18 U.S.C. 2511 prohibits ________.
A) the interception of electronic messages
B) hacking
C) Both A and B
D) Neither A nor B
Q:
18 U.S.C. 1030 protects ________.
A) all computers
B) "protected computers" such as government computers
C) Both A and B
D) Neither A nor B
Q:
18 U.S.C. 1030 prohibits ________.
A) hacking
B) malware attacks
C) denial-of-service attacks
D) All of the above
Q:
Courts will often admit unreliable evidence if judges believe that juries can be trusted to evaluate it properly.
Q:
The prosecutor must demonstrate ________ at the time of the action at the center of a criminal trial.
A) reasonable doubt
B) mens rea
C) Both A and B
D) Neither A nor B
Q:
________ deals with the violation of criminal statutes.
A) Criminal law
B) Civil law
C) Both A and B
D) Neither A nor B
Q:
Black holing is an effective long-term containment solution.
Q:
Disconnection ________.
A) is the most decisive way to do termination
B) harms legitimate users
C) Both A and B
D) Neither A nor B
Q:
After wiping/clearing, data is ________.
A) recoverable
B) reusable
C) Both A and B
D) Neither A nor B
Q:
One of the most often overlooked mechanisms used to reduce data loss is employee training.
Q:
Companies address the risk of losing a security key by using ________.
A) encryption key resets
B) key escrow
C) Both A and B
D) Neither A nor B
Q:
DML triggers are used to ________.
A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B
D) Neither A nor B
Q:
Retaining data can create negative consequences.
Q:
From a legal standpoint, loss of encrypted data comes with negligible risk from the loss private information.
Q:
Who should be involved in the creation of retention policies?
A) Business units
B) The legal department
C) Both A and B
D) Neither A nor B
Q:
Backup media should be encrypted.
Q:
With RAID 5, the following is achieved ________.
A) Parity
B) Striping
C) Redundancy
D) All of the above
Q:
Optical disks can safely hold data for decades.
Q:
Mesh backup is where client PCs in an organization back up each other.