CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 45

35. RAID 0 creates one logical volume across several available hard disk drives and stores the data using ____, in which data segments are written in turn to each disk drive in the array. 36. The determination of what systems fall under the CSIRT ’s responsibility is called its ____. 37. Those services performed in response to a request or a defined event such as a help desk alert are called ____. 38. In the absence of the assigned team manager, the ____ should assume authority for overseeing and evaluating a provided service. 39. When an organization completely outsources its IR work, typically to an on-site contractor, it is called a(n) ____ model. 40. The champion for the CSIRT may be the same person as the champion for the entire IR function—typically, the ____. 41. A CSIRT model that is effective for large organizations and for organizations with major computing resources at distant locations is the ____. 42. The announcement of an operational CSIRT should minimally include ____. 43. A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her activity. 44. Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be under way. 45. The ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications.