CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 36
Question 30
Which of the following collects and provides reports on failed login
attempts, probes, scans, denial-of-service attacks, and detected malware?
Question 31
The last stage of a business impact analysis is prioritizing the resources
associated with the ____, which brings a better understanding of what
must be recovered first.
Question 32
The final component to the CPMT planning process is to deal with ____.
Question 33
The ____ job functions and organizational roles focus on protecting the
organization’s information systems and stored information from attacks.
Question 34