CIS 359 Midterm Exam Set 1 (2) CIS 359 Midterm Exam Set 1 (2) | Page 7

Question 30
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware?
Question 31
The last stage of a business impact analysis is prioritizing the resources associated with the ____, which brings a better understanding of what must be recovered first.
Question 32
The final component to the CPMT planning process is to deal with ____.
Question 33
The ____ job functions and organizational roles focus on protecting the organization’ s information systems and stored information from attacks.
Question 34
A( n) ____ is a detailed examination of the events that occurred, from first detection of an incident to final recovery.
Question 35