CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 32

A( n) ____, a type of IDPS that is similar to the NIDPS, reviews the log files generated by servers, network devices, and even other IDPSs.
• Question 22
New systems can respond to an incident threat autonomously, based on preconfigured options that go beyond simple defensive actions usually associated with IDPS and IPS systems. These systems, referred to as ____, use a combination of resources to detect an intrusion and then to trace the intrusion back to its source.
• Question 23
The ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications.
• Question 24
In an attack known as ____, valid protocol packets exploit poorly configured DNS servers to inject false information to corrupt the servers’ answers to routine DNS queries from other systems on that network.
• Question 25
The purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for response to incidents, recovery from disasters, and reestablishment of operations for continuity.
• Question 26
The first major business impact analysis task is to analyze and prioritize the organization’ s business processes based on their relationships to the organization’ s ____.
• Question 27
The ____ is an investigation and assessment of the impact that various events or incidents can have on the organization.