Intrusion Detection Chapter 9

9 September 2022
4.7 (114 reviews)
21 test answers

Unlock all answers in this set

Unlock answers (17)
question
____ disasters include acts of terrorism and acts of war.
answer
man-made
question
Which of the following is not usually an insurable loss?
answer
Electrostatic discharge
question
An ____ may escalate into a disaster when it grows in scope and intensity.
answer
incident
question
In disaster recovery, the ____ is the point at which a management decision to react is made in reaction to a notice or other datum such as a weather report or an activity report from IT indicating the escalation of an incident.
answer
trigger
question
A ____ is a description of the disasters that may befall an organization, along with information on their probability of occurrence, a brief description of the organization's actions to prepare for that disaster, and the best case, worst case, and most likely case outcomes of the disaster.
answer
disaster scenario
question
Useful resources in the DR planning process are the ____ provided by the Federal Agency Security Practices (FASP) section of NIST's Computer Security Resource Center (CSRC).
answer
contingency plan templates
question
____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up.
answer
Follow-on incidents
question
A ____ is used for an office or small campus, with segment distances measured in tens of meters. It may have only a few hosts, or it may have hundreds of clients with multiple servers.
answer
LAN
question
____ may be caused by earthquakes, floods, storm winds, tornadoes, or mud flows.
answer
Rapid onset disasters
question
____ are those that occur suddenly, with little warning, taking the lives of people and destroying the means of production.
answer
Rapid onset disasters
question
A DR plan addendum should include the trigger, the ____ method, and the response time associated with each disaster situation.
answer
notification
question
The part of a disaster recovery policy that identifies the organizational units and groups of employees to which the policy applies is called the ____ section.
answer
scope
question
____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of his or her latest conquest.
answer
Follow-on incidents
question
A ____ is a collection of nodes in which the segments are geographically dispersed and the physical link is often a data communications channel provided by a public carrier.
answer
WAN
question
The ____ assembles a disaster recovery team.
answer
CPMT
question
According to NIST, the first item of business for a disaster recovery team is to develop the ____.
answer
disaster recovery policy
question
The primary vehicle for articulating the purpose of a disaster recovery program is the ____.
answer
disaster recovery policy
question
____ occur over time and slowly deteriorate the organization's capacity to withstand their effects.
answer
Slow onset disasters
question
Once the incident has been contained, and all signs of the incident removed, the ____ phase begins.
answer
actions after
question
Deciding which technical contingency strategies are selected, developed, and implemented is most often based on the type of ____ being used.
answer
information system
question
Contingency strategies for ____ should emphasize the need for absolutely reliable data backup and recovery procedures because they have less inherent redundancy than a distributed architecture.
answer
mainframes