CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 32

A ( n ) ____ , a type of IDPS that is similar to the NIDPS , reviews the log files generated by servers , network devices , and even other IDPSs .
• Question 22
New systems can respond to an incident threat autonomously , based on preconfigured options that go beyond simple defensive actions usually associated with IDPS and IPS systems . These systems , referred to as ____, use a combination of resources to detect an intrusion and then to trace the intrusion back to its source .
• Question 23
The ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications .
• Question 24
In an attack known as ____, valid protocol packets exploit poorly configured DNS servers to inject false information to corrupt the servers ’ answers to routine DNS queries from other systems on that network .
• Question 25
The purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for response to incidents , recovery from disasters , and reestablishment of operations for continuity .
• Question 26
The first major business impact analysis task is to analyze and prioritize the organization ’ s business processes based on their relationships to the organization ’ s ____.
• Question 27
The ____ is an investigation and assessment of the impact that various events or incidents can have on the organization .