Which of the following is not part of the NIST Framework for Improving Critical Infrastructure Cybersecurity?

a. Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.
b. Anomalous activity is detected within a one-month period, and the potential impact of events is understood.
c. Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.
d. Response processes and procedures are executed and maintained to ensure timely response to detected cybersecurity events.
e. Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.


b. Anomalous activity is detected within a one-month period, and the potential impact of events is understood.

Computer Science & Information Technology

You might also like to view...

Each if structure consists of the word _________ , the _______ to be tested, a ________ , and a ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When adding new software, choosing the ________ installation option allows you to decide which features will be installed

A) comprehensive B) full C) custom D) typical

Computer Science & Information Technology

Large companies never use RDBMS because there would be too much data

Indicate whether the statement is true or false

Computer Science & Information Technology

Data __________ refers to the form in which data is stored, processed, and transmitted.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology