A director of IR is reviewing a report regarding several recent breaches. The director compiles the following statistic’s-Initial IR engagement time frame-Length of time before an executive management notice went out-Average IR phase completionThe director wants to use the data to shorten the response time. Which of the following would accomplish this?

A. CSIRT
B. Containment phase
C. Escalation notifications
D. Tabletop exercise


Ans: D. Tabletop exercise

Computer Science & Information Technology

You might also like to view...

Match each item with a statement below.

A. A hardware device specially designed to terminate VPNs and join multiple LANs. B. Used when a dial-up user has an old system that doesn't support L2TP and needs to use PPP to establish a VPN connection to your network. C. A network accessible to remote users who need dial-in access. D. A single VPN router contains records of all SAs in the VPN. E. Each participant in the VPN has an approved relationship, called a security association (SA), with every other participant. F. Rapidly becoming the protocol of choice for VPN connections of all sorts and should be used when the other protocols are not acceptable. G. Used when a dial-up user needs to establish a VPN connection with your network. H. Generally less expensive than hardware systems, and they tend to scale better on fast-growing networks. I. Links two or more networks.

Computer Science & Information Technology

To calculate totals for smaller groups of records, use ________

A) text box B) a footer C) the grand total D) subtotals

Computer Science & Information Technology

Demographic characteristics considered when developing a target audience profile include social group affiliations, purchasing preferences, and political affiliations.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the simplest and least expensive type of a firewall?

a. Packet filter b. Application level gateway c. Circuit level gateway d. Stateful packet inspection

Computer Science & Information Technology