CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 45
35. RAID 0 creates one logical volume across several available hard
disk drives and stores the data using ____, in which data segments are
written in turn to each disk drive in the array.
36. The determination of what systems fall under the CSIRT ’s
responsibility is called its ____.
37. Those services performed in response to a request or a defined event
such as a help desk alert are called ____.
38. In the absence of the assigned team manager, the ____ should
assume authority for overseeing and evaluating a provided service.
39. When an organization completely outsources its IR work, typically
to an on-site contractor, it is called a(n) ____ model.
40. The champion for the CSIRT may be the same person as the
champion for the entire IR function—typically, the ____.
41. A CSIRT model that is effective for large organizations and for
organizations with major computing resources at distant locations is the
____.
42. The announcement of an operational CSIRT should minimally
include ____.
43. A key step in the ____ approach to incident response is to discover
the identify of the intruder while documenting his or her activity.
44. Using a process known as ____, network-based IDPSs look for
attack patterns by comparing measured activity to known signatures in
their knowledge base to determine whether or not an attack has occurred
or may be under way.
45. The ____ is a federal law that creates a general prohibition on the
realtime monitoring of traffic data relating to communications.