CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 24

• Question 33 ____ refers to those actions taken to meet the psychological and emotional needs of various stakeholders. • Question 34 According to the 2010/2011 Computer Crime and Security Survey, ____ is “the most commonly seen attack, with 67.1 percent of respondents reporting it.” • Question 35 When an alert warns of new malicious code that targets software used by an organization, the first response should be to research the new virus to determine whether it is ____. • Question 36 In a “block” containment strategy, in which the attacker’s path into the environment is disrupted, you should use the most precise strategy possible, starting with ____.