A major security incident is generally handled by the ________
A) IT disaster response team
B) business continuity team
C) CSIRT
D) All of the above
Answer: C
You might also like to view...
Which of the following best describes the selling situation where the salesperson attempts to influence the decision-maker rather than the user or purchasing agent?
A) response selling B) trade selling C) missionary selling D) technical selling
Which of the following would be considered to be a breach of human rights legislation?
A) Paul, a Vice President of a company consistently flirts with Lorraine, another Vice President. B) Jerry, the President of a company, consistently makes sexually suggestive remarks to Janice, a secretary employed to his main supplier C) Michael a supervisor, consistently makes sexually suggestive remarks to Karen a junior employee on his shift. D) Susan, a supervisor in a factory, makes sexually suggestive remarks to Billy another supervisor E) All of the above
Efficient database structures will be beneficial only if queries and the underlying database management system are tuned to properly use the structures
Indicate whether the statement is true or false
Locks with large granularity are easy for the DBMS to administer but frequently cause conflicts
Indicate whether the statement is true or false