CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 36

Question 30 Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware? Question 31 The last stage of a business impact analysis is prioritizing the resources associated with the ____, which brings a better understanding of what must be recovered first. Question 32 The final component to the CPMT planning process is to deal with ____. Question 33 The ____ job functions and organizational roles focus on protecting the organization’s information systems and stored information from attacks. Question 34