A security team wants to establish an Incident Response plan. The team has never experienced an incident.Which of the following would BEST help them establish plans and procedures?
A. Table top exercises
B. Lessons learned
C. Escalation procedures
D. Recovery procedures
Answer: A. Table top exercises
You might also like to view...
A common software exploitation is a ________.
a) buffer overflow attack b) denial-of-service attack c) cryptanalytic attack d) brute-force attack
Which of the following statements is true?
A. The critical path changes if tasks on the critical path are completed behind schedule. B. The critical path changes if tasks on the critical path are completed ahead of schedule. C. Once set, the critical path cannot change. D. Both A and B
The range is identified by its range reference, which is the cell in its upper-left corner and the cell in its lower-right corner, separated by a ____.
A. colon B. semicolon C. comma D. period
What size is an MD5 message digest (hash)?
A. 128 bits B. 160 bits C. 256 bits D. 128 bytes