CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 26

• Question 41 According to NIST, which of the following is an example of a UA attack? • Question 42 Which of the following is the most suitable as a response strategy for malware outbreaks? • Question 43 The ____ team is responsible for working with suppliers and vendors to replace damaged or destroyed equipment or services, as determined by the other teams. • Question 44 The ____ team is responsible for the recovery of information and the reestablishment of operations in storage area networks or network attached storage.