CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 15

Which of the following is the most suitable as a response strategy for malware outbreaks? • Question 43 The ____ team is responsible for working with suppliers and vendors to replace damaged or destroyed equipment or services, as determined by the other teams. • Question 44 The ____ team is responsible for the recovery of information and the reestablishment of operations in storage area networks or network attached storage. • Question 45 The ____ system is an information system with a telephony interface that can be used to automate the alert process. • Question 46 ____ is the inclusion of action steps to minimize the damage associated with the disaster on the operations of the organization. • Question 47 The ____ team is primarily responsible for data restoration and recovery. • Question 48 The ____ is the phase associated with implementing the initial reaction to a disaster; it is focused on controlling or stabilizing the situation, if that is possible. • Question 49 The ____ team is responsible for recovering and reestablishing operating systems (OSs).