CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 50
•
Question 14
A(n) ____ is a detailed examination of the events that occurred, from
first detection of an incident to final recovery.
•
Question 15
The Southeast Collegiate Cyber Defense Competition is unique in that it
focuses on the operational aspect of managing and protecting an existing
network infrastructure. Unlike “capture-the-flag ” exercises, this
competition is exclusively a real-world ____ competition.
•
Question 16
The U.S. National Institute of Standards and Technology recommends a
set of tools for the CSIRT including incident reporting mechanisms with
which users can report suspected incidents. At least one of these
mechanisms should permit people to report incidents ____.
•
Question 17