CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 57
The ____ illustrates the most critical characteristics of information and
has been the industry standard for computer security since the
development of the mainframe.
•
Question 42
____ is the process of examining, documenting, and assessing the
security posture of an organization’s information technology and the
risks it faces.
•
Question 43
A CSIRT model that is effective for large organizations and for
organizations with major computing resources at distant locations is the
____.
•
Question 44
The CSIRT should be available for contact by anyone who discovers or
suspects that an incident involving the organization has occurred. Some
organizations prefer that employees contact a ____, which then makes
the determination as to whether to contact the CSIRT or not.