CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 24
•
Question 33
____ refers to those actions taken to meet the psychological and
emotional needs of various stakeholders.
•
Question 34
According to the 2010/2011 Computer Crime and Security
Survey, ____ is “the most commonly seen attack, with 67.1 percent of
respondents reporting it.”
•
Question 35
When an alert warns of new malicious code that targets software
used by an organization, the first response should be to research the new
virus to determine whether it is ____.
•
Question 36
In a “block” containment strategy, in which the attacker’s path
into the environment is disrupted, you should use the most precise
strategy possible, starting with ____.