The steps in IR are designed to:

A. stop the incident, mitigate incident effects, provide information for recovery from the incident
B. control legal exposure, avoid unfavorable media attention, and minimize impact on stock prices 
C. delay the incident progress, backtrack the attack to its source IP, and apprehend the intruder
D. stop the incident, inventory affected systems, and determine appropriate losses for insurance settlement


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following will not produce a compiler error?

a. Changing the value of a constant after it is initialized. b. Changing the value at a given index of an array after it is created. c. Using a final variable before it is initialized. d. All of the above will produce compiler errors.

Computer Science & Information Technology

Clicking the Show Formulas button in the Formula Auditing group on the Formula tab displays the ________ in the appropriate cells

A) underlying formulas B) displayed values C) displayed formulas D) underlying values

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

A separate manual validation is recommended for all raw acquisitions at the time of analysis.

Computer Science & Information Technology

Which of the following statements is false?

a. For your convenience, Google provides many preconfigured devices that you can use to quickly create AVDs. b. You perform the swipe gesture on an AVD by placing the mouse over the AVD’s “screen” and dragging up with the mouse. c. One problem with developing Android apps is that you’ll need to purchase a broad range of devices on which to test your apps. d. All of the above are true.

Computer Science & Information Technology