List four of the seven activities specified by the EBK for incident management.
What will be an ideal response?
1. Coordinate with stakeholders to establish the incident management program.
2. Establish relationships between the incident response team (IRT) and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, and public relations professionals).
3. Acquire and manage resources, including financial resources, for incident management functions.
4. Ensure coordination between the IRT and the security administration and technical support teams.
5. Apply lessons learned from information security incidents to improve incident management processes and procedures.
6. Ensure that appropriate changes and improvement actions are implemented as required.
7. Establish an incident management measurement program.
You might also like to view...
Two objectives are paramount in designing the I/O facility: generality and __________ .
Fill in the blank(s) with the appropriate word(s).
In making the determination to overload a binary operator as either a friend or a member operator function, the following convention can be applied: member functions are more appropriate for binary functions that modify neither of their operands, such as == +, and -, whereas friend functions are more appropriate for binary functions, such as =, +=, and -= that are used to modify one of their operands.
Answer the following statement true (T) or false (F)
Medical facilities cannot release information regarding a patient unless the patient has signed a ____________________ form.
Fill in the blank(s) with the appropriate word(s).
Which of the following is a small, flat, rectangular pointing device that is sensitive to pressure and motion?
A. trackball B. touchpad C. optical mouse D. stylus