CIS 359 Midterm Exam Set 1 (2) CIS 359 Midterm Exam Set 1 (2) | Page 7

Question 30
Which of the following collects and provides reports on failed login attempts , probes , scans , denial-of-service attacks , and detected malware ?
Question 31
The last stage of a business impact analysis is prioritizing the resources associated with the ____, which brings a better understanding of what must be recovered first .
Question 32
The final component to the CPMT planning process is to deal with ____.
Question 33
The ____ job functions and organizational roles focus on protecting the organization ’ s information systems and stored information from attacks .
Question 34
A ( n ) ____ is a detailed examination of the events that occurred , from first detection of an incident to final recovery .
Question 35