Quiz: Module 02 Flashcards

1
Q

Information about a person’s history, background, and attributes that can be used to commit identity theft is often referred to as _____.
a. personally identifiable information (PII)
b. protected health information (PHI)
c. personal health information (PHI)
d. protected identifiable information (PII)

A

personally identifiable information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a CPMT, the ____ leads the project to make sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed.
a. incident manager
b. champion
c. crisis manager
d. project manager

A

project manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The first major task of a business impact analysis is to analyze and prioritize the organization’s _____ based on their relationships to the organization’s mission.
a. business processes
b. information assets
c. threats
d. vulnerabilities

A

business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware?
a. departmental reports
b. business impact analysis
c. vulnerability scans
d. system logs

A

system logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The primary budgetary expense for disaster recovery is _____.
a. hardware
b. software
c. insurance
d. generators

A

c. insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A breach law is one that specifies a requirement for an organization to notify affected parties when they detect the loss of a specified type of information.
a. True
b. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A business impact analysis (BIA) identifies threats, vulnerabilities, and potential attacks to determine what specific controls can protect the information.
a. True
b. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Team leaders from the subordinate teams, including the IR, DR, and BC teams, should not be included in the CPMT.
a. True
b. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A weighted analysis table can be useful in resolving the issue of identifying which business functions are the most critical to the organization.
a. True
b. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ncident response capabilities are not usually part of a normal IT budget.
a. True
b. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly