CIS 462 All Assignments CIS 462 All Assignments | Page 8

• Question 22 During which phase of incident response do IRT members study the attack and develop recommendations to prevent similar attacks in the future? • Question 23 During which phase of incident response do IRT members recover from the attack and resume operations? • Question 24 During which phase of incident response do IRT members stop the attack and gather evidence? • Question 25 During which phase of incident response do IRT members stop the attack and gather evidence? • Question 26 Triage is performed during which phase of incident response? • Question 27 According to the Payment Card Industry Data Security Standard (PCI DSS), what is classified as an incident? • Question 28 When analyzing an IT incident, which of the following is not something you need to identify? • Question 29 When reporting an incident, the IRT team must first classify the _________ of the incident • Question 30 A System Use Notification standard describes the on-screen display of system notification messages, such as a legal notice that the user is accessing a protected system. With which IT domain is this standard primarily associated? • Question 31 A LAN Domain policy would include guidelines for which of the following? • Question 32 A Separation of Environments standard establishes the need to separate the development environment from the production environment. With which IT domain is this standard primarily associated? • Question 33 A User Internet Proxy standard and a Content-Blocking Tools Configuration standard would be associated primarily with which IT domain? • Question 34 Baseline standards for the LAN Domain would include ____________. • Question 35 Which of the following documents describes core control requirements for framework policies? • Question 36 A PKI uses public and private ______ for the secure exchange of information.