CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 22

____ is the process of systematically examining information assets for evidentiary material that can provide insight into how an incident transpired. Question 39 A favorite pastime of information security professionals is ____, which is a simulation of attack and defense activities using realistic networks and information systems. Question 40 Should an incident begin to escalate, the CSIRT team leader continues to add resources and skill sets as necessary to attempt to contain and terminate the incident. The resulting team is called the ____ for this particular incident. Question 41 General users require training on the technical details of how to do their jobs securely, including good security practices, ____ management, specialized access controls, and violation reporting. Question 42 The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe. Question 43 ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process. Question 44