CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 22
____ is the process of systematically examining information assets for
evidentiary material that can provide insight into how an incident
transpired.
Question 39
A favorite pastime of information security professionals is ____,
which is a simulation of attack and defense activities using realistic
networks and information systems.
Question 40
Should an incident begin to escalate, the CSIRT team leader continues
to add resources and skill sets as necessary to attempt to contain and
terminate the incident. The resulting team is called the ____ for this
particular incident.
Question 41
General users require training on the technical details of how to do
their jobs securely, including good security practices, ____
management, specialized access controls, and violation reporting.
Question 42
The ____ illustrates the most critical characteristics of information
and has been the industry standard for computer security since the
development of the mainframe.
Question 43
____ assigns a risk rating or score to each information asset. Although
this number does not mean anything in absolute terms, it is useful in
gauging the relative risk to each vulnerable information asset and
facilitates the development of comparative ratings later in the risk
control process.
Question 44