Create an account
_______ planning ensures that critical business functions can continue if a disaster
A ____ activation requires that the first person call designated people on the roster, who in turn call other designated people, and so on.
_______________ is a set of procedures that commence when an incident is detected.
The process of examining a possible incident and determining whether it constitutes an actual incident is called incident verification.
Statement of management commitment
Purpose and objectives of the policy
Scope of the policy
Definition of information security incidents
Organizational structure and delineation of roles
Prioritization or severity ratings of incidents
Reporting and contact forms
List the key components of a typical IR policy.
business impact analysis
The four components of contingency planning are the ____________________, the incident response plan, the disaster recovery plan, and the business continuity plan.
Crisis management entails a set of focused steps that deal primarily with the people involved in a disaster.
The ____ team collects information about information systems and the threats they face, and creates the contingency plans for incident response, disaster recovery, and business continuity.
attack scenario end case
A(n) ____ shows the estimated cost of the best, worst, and most likely outcomes of an attack.
The ____________________ plan comprises a detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event that might compromise information resources and assets.
A(n) ____________________ occurs when an attack affects information resources and/or assets, causing actual damage or other disruptions.
A(n) ____ entails a detailed examination of the events that occurred from first detection to final recovery.
The disaster recovery team is responsible for detecting, evaluating, and responding to disasters, and reestablishing operations at the primary business site.
As part of DR plan readiness, each employee should have two types of ____ information cards in his or her possession at all times.
The ____________________ team is charged with setting up and starting off-site operations in the event of an incident or disaster.
A(n) ____________________ is a method of testing contingency plans in which all involved individuals walk through the steps they would take during an actual event.
The bulk batch-transfer of data to an off-site facility is known as ________________.
____ is the storage of duplicate online transaction data, along with the duplication of the databases at the remote site on a redundant server.
incident damage assessment
The immediate determination of the scope of the breach of confidentiality, integrity, and availability of information and information assets is called ____________________.
A structured walk-through is the simplest kind of validation for reviewing the perceived feasibility and effectiveness of the contingency plan.
A ____ is a fully configured computer facility that needs only the latest data backups and the personnel to function.
____ is a method of testing contingency plans in which each involved person works individually to simulate the performance of each task.
The presence of hacker tools in a system definitely signals that an incident is in progress or has occurred.
A(n) ____________________ is a document containing contact information of the individuals to notify in the event of an actual incident.
____ is the process of examining a possible incident and determining whether it constitutes an actual incident.
A(n) attack scenario consists of a detailed description of the activities that usually occur during an attack.
The overall process of preparing for unexpected events is called _________________.
Rapid-onset disasters occur suddenly, and may take the lives of people and destroy the means of production.
Continuous process improvement (CPI) suggests that each time the organization rehearses its plans, it should learn from the process, improve the process, and then rehearse again.
A(n) champion is an executive who supports, promotes, and endorses the findings of the CP project.
A(n) structured walk-through is a method of testing contingency plans in which each involved person works individually to simulate the performance of each task that he or she is responsible for.
A project manager—possibly a mid level manager or even the ____________________ — leads the project, putting in place a sound project planning process, guiding the development of a complete and useful project, and prudently managing resources.
Disasters that occur suddenly, with little warning, are classified as ____________________ disasters.
incident damage assestment
A(n) ____ determines the extent of the breach of confidentiality, integrity, and availability of information and information assets.
A contract between two organizations in which each party agrees to assist the other in the event of a disaster is called a ____.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together