List and describe the four phases of incident response.
What will be an ideal response?
1. Planning-getting ready to handle incidents
2. Detection-identifying that an incident has occurred
3. Reaction-responding to the immediate threat of an incident and regaining control of information assets
4. Recovery-getting things "back to normal," resolving the damage done during the incident, and understanding what happened to prevent reoccurrence
You might also like to view...
The keyword sealed is applied to methods and classes to:
a) prevent overriding and inheritance b) guarantee an implementation exists c) specify a class is concrete d) None of the above.
Which of the following is not an algorithm?
a. A recipe. b. Operating instructions. c. Textbook index. d. Shampoo instructions (lather, rinse, repeat).
The file system and the IOCS support application programs in real time as they execute and thus must be __________.
a. transient b. open source c. linkable d. resident
A plastic scribe is a technology tool to write on smartphones and tablets
Indicate whether the statement is true or false