CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 26
•
Question 41
According to NIST, which of the following is an example of a
UA attack?
•
Question 42
Which of the following is the most suitable as a response strategy
for malware outbreaks?
•
Question 43
The ____ team is responsible for working with suppliers and
vendors to replace damaged or destroyed equipment or services, as
determined by the other teams.
•
Question 44
The ____ team is responsible for the recovery of information and
the reestablishment of operations in storage area networks or network
attached storage.