Match each term with the correct statement below.
A. Ensures that any potentially harmful occurrence is first identified and then reported
B. The general organizational guidelines for how to respond to incidents; meant to help dictate specific procedures
C. Any happenings that could represent harm to information placed under the protection of the incident response function
D. Initiated by the detection of an event that the organization deems harmful
E. Used to evaluate the effectiveness of a given security function
F. An event involving unauthorized access, or a violation of the rules for information retrieval and use
G. The centerpiece of the incident response process
H. Any event that disrupts normal operating conditions
I. Include things like pre-attack probes, unauthorized access attempts, denial of service attempts, or flaws in the organization's security architecture that are identified by the staff
A. Incident response management
B. Incident response policy
C. Security incidents
D. Incident response
E. Penetration testing
F. Intrusion
G. IRT
H. Incident
I. Potential incidents
You might also like to view...
A ____ evaluates to a true or false value.
A. sentinel B. condition C. Boolean expression D. selection structure
When viewed in binary notation, the first octet of a Class B network begins with __________________.
Fill in the blank(s) with the appropriate word(s).
A disk defragmentation utility removes unused files from your hard drive so the computer doesn't search through unneeded files.
Answer the following statement true (T) or false (F)
In the Internet world, most certificates follow the LDAP standard defined in RFC 2459 by IETF.
Answer the following statement true (T) or false (F)