CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 15
Which of the following is the most suitable as a response
strategy for malware outbreaks?
•
Question 43
The ____ team is responsible for working with suppliers and
vendors to replace damaged or destroyed equipment or services, as
determined by the other teams.
•
Question 44
The ____ team is responsible for the recovery of information
and the reestablishment of operations in storage area networks or
network attached storage.
•
Question 45
The ____ system is an information system with a telephony
interface that can be used to automate the alert process.
•
Question 46
____ is the inclusion of action steps to minimize the damage
associated with the disaster on the operations of the organization.
•
Question 47
The ____ team is primarily responsible for data restoration
and recovery.
•
Question 48
The ____ is the phase associated with implementing the initial
reaction to a disaster; it is focused on controlling or stabilizing the
situation, if that is possible.
•
Question 49
The ____ team is responsible for recovering and reestablishing
operating systems (OSs).