Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?
Which of the following authorizes and documents all the changes in the IT Infrastructure and its components (Configuration Items) in order to maintain a minimum amount of interruptive effects upon the running operation?
Which of the following sets of incident response practices is recommended by the CERT/CC?
Which of the following defines the communication link between a Web server and Web applications?
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Which of the following procedures is designed to contain data, hardware, and software that can be critical for a business?