What are the three levels of escalation of threat or security incidents?  Describe them.

What will be an ideal response?


Level One (minor to moderate)-These incidents are the least severe and typically must be managed within one working day of their occurrence.
Level Two (major)-These incidents are moderately serious. They should be managed on the same day they occur-ideally, within four hours.
Level Three (catastrophic)-These incidents are the most serious; they must be handled immediately.

Computer Science & Information Technology

You might also like to view...

____________________ reporting ensures that every potentially harmful event gets an organizationally sanctioned response.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are some of the most common events that may indicate an attack in progress?

What will be an ideal response?

Computer Science & Information Technology

In a database table, the ________ field type is used for long text or combinations of text and numbers

A) Float B) Number C) Text D) Memo

Computer Science & Information Technology

Which of the following is NOT true regarding input masks?

A) An input mask provides the punctuation so you do not have to type it. B) An input mask defines a consistent template. C) Access has a wizard that creates automatic masks for Social Security numbers, zip codes, passwords, extensions, dates, and times. D) Input masks do not affect how data is stored.

Computer Science & Information Technology