Quiz: Module 02 Flashcards
Information about a person’s history, background, and attributes that can be used to commit identity theft is often referred to as _____.
a. personally identifiable information (PII)
b. protected health information (PHI)
c. personal health information (PHI)
d. protected identifiable information (PII)
personally identifiable information (PII)
In a CPMT, the ____ leads the project to make sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed.
a. incident manager
b. champion
c. crisis manager
d. project manager
project manager
The first major task of a business impact analysis is to analyze and prioritize the organization’s _____ based on their relationships to the organization’s mission.
a. business processes
b. information assets
c. threats
d. vulnerabilities
business processes
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware?
a. departmental reports
b. business impact analysis
c. vulnerability scans
d. system logs
system logs
The primary budgetary expense for disaster recovery is _____.
a. hardware
b. software
c. insurance
d. generators
c. insurance
A breach law is one that specifies a requirement for an organization to notify affected parties when they detect the loss of a specified type of information.
a. True
b. False
True
A business impact analysis (BIA) identifies threats, vulnerabilities, and potential attacks to determine what specific controls can protect the information.
a. True
b. False
False
Team leaders from the subordinate teams, including the IR, DR, and BC teams, should not be included in the CPMT.
a. True
b. False
False
A weighted analysis table can be useful in resolving the issue of identifying which business functions are the most critical to the organization.
a. True
b. False
True
ncident response capabilities are not usually part of a normal IT budget.
a. True
b. False
False