The ____ team is responsible for reestablishing connectivity between...
The focus during a(n) ____ is on learning what worked, what...
The purpose of the ____ is to define the scope of the CP operations...
A ____ attack is much more substantial than a DoS attack because of...
Information assets have ____ when authorized users - persons or...
The ____ team is primarily responsible for data restoration and...
____ is the process of moving an organization toward its vision.
In an attack known as ____, valid protocol packets exploit poorly...
The task of monitoring file systems for unauthorized change is best...
The Southeast Collegiate Cyber Defense Competition is unique in that...
____ is used both for intrusion analysis and as part of evidence...
____ assigns a risk rating or score to each information asset....
____ is a risk control approach that attempts to shift the risk to...
According to NIST, which of the following is an example of a UA...
A(n) ____ is a CSIRT team member, other than the team leader, who is...
The U.S. National Institute of Standards and Technology defines the...
One of the primary responsibilities of the IRP team is to ensure that...
The first group to communicate the CSIRT's vision and operational...
A(n) ____ is an investigation and assessment of the impact that...
A(n) ____ is used to anticipate, react to, and recover from events...
Using a process known as ____, network-based IDPSs look for attack...
____ are highly probable when infected machines are brought back...
The ____ handles computer crimes that are categorized as felonies.
____ is a valuable resource for additional information on building and...
A ____ is used for an office or small campus, with segment distances...
Some recovery strategies seek to improve the ____ of a server or...
In the context of disaster notification, the ____ is a scripted...
A resumption location known as a ____ or a _______ is a fully...
A(n) ____ is an object, person, or other entity that is a potential...
When an organization completely outsources its IR work, typically to...
The Business Continuity Institute offers an uncertified category of...
The ____ is an investigation and assessment of the impact that various...
A key step in the ____ approach to incident response is to discover...
The determination of what systems fall under the CSIRT 's...
The ____ system is an information system with a telephony interface...
The ____ phase of forensic analysis involves the use of forensic tools...
When an alert warns of new malicious code that targets software used...
The process of evaluating the circumstances around organizational...
A(n) ____ is a sign that an activity now occurring may signal an...
When an incident includes a breach of physical security, all aspects...
Clifford Stoll's book, ____, provides an excellent story about a...
____ are likely in the event of a hacker attack, when the attacker...
A ____ is a small quantity of data kept by a Web site as a means of...
Both data backups and archives should be based on a(n) ____ schedule...
A backup plan using WAN/VLAN replication and a recovery strategy using...
When implementing a BC plan, an organization reaches a predetermined...
A CSIRT model in which a single CSIRT handles incidents throughout the...
Once BC activities have come to a close and the organization has...
Those services undertaken to prepare the organization or the CSIRT...
Those services performed in response to a request or a defined event...
A certification offered by the Business Continuity Institute is called...
____ is the deactivation of the disaster recovery teams, releasing...
____ hack systems to conduct terrorist activities through network or...
____ is a set of focused steps that deal primarily with the safety and...
In a CPMT, a(n) ____ should be a high-level manager with influence and...
Forensic investigators use ____ copying when making a forensic image...
A continuously changing process presents challenges in acquisition, as...
____ is the process of systematically examining information assets for...
A CPMT should include _____ who can oversee the security planning of...
____ is the determination of the initial flaw or vulnerability that...
The ____ section of the business continuity policy identifies the...
The ____ job functions and organizational roles focus on protecting...
General users require training on the technical details of how to do...
The forensic tool ____ does extensive pre-processing of evidence items...
The ____ is used to collect information directly from the end users...
A ____ is a description of the disasters that may befall an...
The first major business impact analysis task is to analyze and...
____ ensures that only those with the rights and privileges to access...
The ____ assembles a disaster recovery team.
The ____ team is responsible for providing the initial assessments of...
____ means making an organization ready for possible contingencies...
____ is the risk control approach that attempts to reduce the impact...
An ____ may escalate into a disaster when it grows in scope and...
Information assets have ____ when they are not exposed (while being...
____ disasters include acts of terrorism and acts of war.
The ____ illustrates the most critical characteristics of information...
Which of the following is not usually an insurable loss?
Known as ____, procedures for regaining control of systems and...
The training delivery method with the lowest cost to the organization...
Deciding which technical contingency strategies are selected,...
In a "block" containment strategy, in which the...
The elements required to begin the ____ process are a planning...
Useful resources in the DR planning process are the ____ provided by...
Considered to be the traditional "lock and copy" approach to...
Within an organization, a(n) ____ is a group of individuals who are...
____ uses a number of hard drives to store information across multiple...
An organization aggregates all local backups to a central repository...
A(n) ____ is often included in legal documents to ensure that a vendor...
If an intruder can ____ a device, then no electronic protection can...
Advances in cloud computing have opened a new field in application...
A ____ is a document that describes how, in the event of a disaster,...
The ____ is the point in the past to which the recovered applications...
A favorite pastime of information security professionals is ____,...
____ is a tactic that deliberately permits an attack to continue while...
Two dominantly recognized professional institutions certifying...
A BC subteam called the ____ is responsible for establishing the core...
A ____ is an agency that provides physical facilities in the event of...
A(n) ____ is any clearly identified attack on the organization's...
The CSIRT must have a clear and concise ____ statement that, in a few...
The ____ section of the business continuity policy identifies the...
The ____ section of the business continuity policy provides an...
The champion for the CSIRT may be the same person as the champion for...
A ____ attack is much more substantial than a DoS attack because of...
In evidence handling, specifically designed ____ are helpful because...
Identifying measures, called ____, that reduce the effects of system...
The purpose of the ____ is to provide a way for management to obtain...
When a second attack, using the means and methods of the first attack...
A(n) ____ occurs when a situation results in service disruptions for...
The ____ is the phase associated with implementing the initial...
A(n) ____ covers the confidentiality of information from everyone...
Essentially a DoS attack, a ____ is a message aimed at causing...
The ____ is a detailed examination of the events that occurred, from...
The final component to the CPMT planning process is to deal with ____.
One way to identify a particular digital item (collection of bits) is...
The last stage of a business impact analysis is prioritizing the...
The ____ is the period of time within which systems, applications, or...
The ____ of an organization defines the roles and responsibilities for...
In contingency planning, an adverse event that threatens the security...
The responsibility for creating an organization's IR plan often...
Which of the following collects and provides reports on failed login...
A(n) ____ attack is a method of combining attacks with rootkits and...
There are a number of professional IR agencies, such as ____, that can...
The ____ team is responsible for recovering and reestablishing...
The primary vehicle for articulating the purpose of a disaster...
New systems can respond to an incident threat autonomously, based on...
A(n) ____ is an extension of an organization's intranet into cloud...
A(n) ____ is any system resource that is placed onto a functional...
____ are closely monitored network decoys serving that can distract...
The use of IDPS sensors and analysis systems can be quite complex. One...
The ongoing activity from alarm events that are accurate and...
Most organizations will find themselves awash in incident candidates...
During the ____ phase, the organization begins the recovery of the...
A ____ is commonly a single device or server that attaches to a...
A(n) ____ backup only archives the files that have been modified since...
The IR plan is usually ____ when an incident causes minimal damage...
A(n) ____ is a plan or course of action used by an organization to...
The ____ is the amount of time that a business can tolerate losing...
The ____ team is responsible for working with the remainder of the...
____ (sometimes referred to as avoidance) is the risk control strategy...
RAID 0 creates one logical volume across several available hard disk...
A(n) ____...
A potential disadvantage of a ____ site-resumption strategy is that...
____ planning represents the final response of the organization when...
One way to build and maintain staff skills is to develop...
A ____ deals with the preparation for and recovery from a disaster,...
The announcement of an operational CSIRT should minimally include...
The ____ is the point in time, determined by the business unit, from...
A forensics team typically uses two methods to document a scene as it...
In the ____ section of the business continuity policy, the training...
A ____ is a contractual document guaranteeing certain minimal levels...
Grounds for challenging the results of a digital investigation can...
____ incident responses enables the organization to react to a...
The ____ approach for detecting intrusions is based on the frequency...
Should an incident begin to escalate, the CSIRT team leader continues...
Incident analysis resources include network diagrams and lists of...
One modeling technique drawn from systems analysis and design that can...
A manual alternative to the normal way of accomplishing an IT task...
The CSIRT should be available for contact by anyone who discovers or...
A search is constitutional if it does not violate a person's...
A CSIRT model that is effective for large organizations and for...
____ of risk is the choice to do nothing to protect an information...
The ____ Department of an organization needs to review the procedures...
____ incidents are predominantly characterized as a violation of...
____ are those that occur suddenly, with little warning, taking the...
In disaster recovery, the ____ is the point at which a management...
____ is a common indicator of a DoS attack.
The ____ involves providing copies of the DR plan to all teams and...
Which of the following is the most suitable as a response strategy for...
The CSIRT may not wish to "tip off" attackers that they have...
In a CPMT, a(n) ____ leads the project to make sure a sound project...
The ____ job functions and organizational roles focus on costs of...
In the event that a definite indicator is recognized, the...
What is a common approach used in the discipline of systems analysis...
The ____ team is responsible for providing any needed supplies, space,...
When the measured activity is outside the baseline parameters in a...
The ____ is the group responsible for initiating the occupation of the...
The organization must first understand what skills are needed to...
Companies may want to consider budgeting for contributions to employee...
Essential BC supplies needed at an alternate site include portable...
____ involves an attempt made by those who may become subject to...
The U.S. Department of Homeland Security's Federal Emergency...
A recommended practice for the implementation of the physical IR plan...
The stability of information over time is called its ____.
Many private sector organizations require a formal statement, called...
The functional part of forensics called ____ is about assessing the...
A(n) ____ is the set of rules and configuration guidelines governing...
A(n) ____ , a type of IDPS that is similar to the NIDPS, reviews the...
A ____ is a collection of nodes in which the segments are...
A ____ rootkit is one that becomes a part of the system bootstrap...
____ occur over time and slowly deteriorate the organization's...
____ may be caused by earthquakes, floods, storm winds, tornadoes, or...
The part of a disaster recovery policy that identifies the...
A(n) ____ is a sign that an adverse event is underway and has a...
A recommended practice for the implementation of the physical IR plan...
If a user receives a message whose tone and terminology seems intended...
The committees of the CPMT follow a set of general stages to develop...
The number-one IU preparation-and-prevention strategy is ____.
Once the incident has been contained, and all signs of the incident...
Many malware attacks are ____ attacks, which involve more than one...
Contingency strategies for ____ should emphasize the need for...