A security team wants to establish an Incident Response plan. The team has never experienced an incident.Which of the following would BEST help them establish plans and procedures?

A. Table top exercises
B. Lessons learned
C. Escalation procedures
D. Recovery procedures


Answer: A. Table top exercises

Computer Science & Information Technology

You might also like to view...

A common software exploitation is a ________.

a) buffer overflow attack b) denial-of-service attack c) cryptanalytic attack d) brute-force attack

Computer Science & Information Technology

Which of the following statements is true?

A. The critical path changes if tasks on the critical path are completed behind schedule. B. The critical path changes if tasks on the critical path are completed ahead of schedule. C. Once set, the critical path cannot change. D. Both A and B

Computer Science & Information Technology

The range is identified by its range reference, which is the cell in its upper-left corner and the cell in its lower-right corner, separated by a ____.

A. colon B. semicolon C. comma D. period

Computer Science & Information Technology

What size is an MD5 message digest (hash)?

A. 128 bits B. 160 bits C. 256 bits D. 128 bytes

Computer Science & Information Technology