List the primary steps in the incident management process.

What will be an ideal response?


(1) Receive the incident
(2) Prescreen the incident
(3) Authenticate the user
(4) Log the incident
(5) Screen the incident
(6) Prioritize the problem
(7) Assign the problem to agent
(8) Track the incident
(9) Escalate the incident
(10) Resolve the incident
(11) Close the incident
(12) Archive the incident

Computer Science & Information Technology

You might also like to view...

A for statement contains three expressions: initialization, test, and

A) repeat. B) validate. C) update. D) quit. E) increment.

Computer Science & Information Technology

A style rule value defines the target to which a style rule is applied.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which statement is TRUE regarding link encryption?

A. Packets are decrypted at each device. B. The user can select exactly what is encrypted. C. It only affects the performance of the sending and receiving devices. D. Packet headers are not encrypted.

Computer Science & Information Technology

A graph is empty if the number of vertices is 1.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology