Match each term with the correct statement below.
A. Ensures that any potentially harmful occurrence is first identified and then reported
B. The general organizational guidelines for how to respond to incidents; meant to help dictate specific procedures
C. Any happenings that could represent harm to information placed under the protection of the incident response function
D. Initiated by the detection of an event that the organization deems harmful
E. Used to evaluate the effectiveness of a given security function
F. An event involving unauthorized access, or a violation of the rules for information retrieval and use
G. The centerpiece of the incident response process
H. Any event that disrupts normal operating conditions
I. Include things like pre-attack probes, unauthorized access attempts, denial of service attempts, or flaws in the organization's security architecture that are identified by the staff
A. Incident response management
B. Incident response policy
C. Security incidents
D. Incident response
E. Penetration testing
F. Intrusion
G. IRT
H. Incident
I. Potential incidents
You might also like to view...
Most operating vendors aim to achieve C2 security rating for their operating systems
Indicate whether the statement is true or false.
Explain the differences between a Gantt chart and a PERT/CPM chart.
What will be an ideal response?