assist with the following questions? Part OneModule 05: Incident Response and Contingency Planning Review Questions What is the name for the broad process of planning
assist with the following questions?
Part OneModule 05: Incident Response and Contingency Planning Review Questions
- What is the name for the broad process of planning for the unexpected? What are its primary components?
- Answer:
- Which two communities of interest are usually associated with contingency planning? Which community must give authority to ensure broad support for the plans?
- Answer:
- According to some reports, what percentage of businesses that do not have a disaster plan go out of business after a major loss?
- Answer:
- List the seven-step CP process recommended by NIST.
- Answer:
- List and describe the teams that perform the planning and execution of the CP plans and processes. What is the primary role of each?
- Answer:
- Define the term incident as used in the context of IRP. How is it related to the concept of incident response?
- Answer:
- List and describe the criteria used to determine whether an actual incident is occurring.
- Answer:
- List and describe the sets of procedures used to detect, contain, and resolve an incident.
- Answer:
- What is incident classification?
- Answer:
- List and describe the actions that should be taken during the reaction to an incident.
- Answer:
- What is an alert roster? What is an alert message? Describe the two ways they can be used.
- Answer:
- List and describe several containment strategies given in the text. On which tasks do they focus?
- Answer:
- What is a disaster recovery plan, and why is it important to the organization?
- Answer:
- What is a business continuity plan, and why is it important?
- Answer:
- What is a business impact analysis, and what is it used for?
- Answer:
- Why should contingency plans be tested and rehearsed?
- Answer:
- Which types of organizations might use a unified continuity plan? Which types of organizations might use the various contingency planning components as separate plans? Why?
- Answer:
- What strategies can be used to test contingency plans?
- Answer:
- List and describe two specialized alternatives not often used as a continuity strategy.
- Answer:
- What is digital forensics, and when is it used in a business setting?
- Answer:
- What is a security awareness program?
- Answer:
Module 06: Legal, Ethical, and Professional Issues in Information Security Review Questions
- What is the difference between law and ethics?
- Answer:
- What is civil law, and what does it accomplish?
- Answer:
- What are the primary examples of public law?
- Answer:
- Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change?
- Answer:
- Which law was created specifically to deal with encryption policy in the United States?
- Answer:
- What is privacy in an information security context?
- Answer:
- What is another name for the Kennedy-Kassebaum Act (1996), and why is it important to organizations that are NOT in the healthcare industry?
- Answer:
- If you work for a financial services organization such as a bank or credit union, which 1999 law affects your use of customer data? What other effects does it have?
- Answer:
- What is the primary purpose of the USA PATRIOT Act, and how has it been revised since its original passage?
- Answer:
- What is PCI DSS, and why is it important for information security?
- Answer:
- What is intellectual property (IP)? What laws currently protect IP in the United States and Europe?
- Answer:
- How does the Sarbanes-Oxley Act of 2002 affect information security managers?
- Answer:
- What is due care? Why should an organization make sure to exercise due care in its usual course of operations?
- Answer:
- How is due diligence different from due care? Why are both important?
- Answer:
- What is a policy? How is it different from a law?
- Answer:
- What are the three general categories of unethical computer use?
- Answer:
- What are the three general causes of illegal or unethical activity?
- Answer:
- Of the information security organizations listed in this module that have codes of ethics, which has been established for the longest time? When was it founded?
- Answer:
- Of the organizations listed in this module that have codes of ethics, which is focused on auditing and control?
- Answer:
- How do people from varying ethnic backgrounds differ in their views of computer ethics?
- Answer:
Module 07: Security and Personnel Review Questions
- What member of an organization should decide where the information security function belongs within the organizational structure? Why?
- Answer:
- List and describe the options for placing information security within the organization.
- Answer:
- For each major information security job title covered in the module, list and describe the key qualifications and requirements for the position.
- Answer:
- What factors influence an organization's decisions to hire information security professionals?
- Answer:
- Prioritize the list of general attributes that organizations seek when hiring information security professionals. In other words, list the most important attributes first. Use the list you developed to answer the previous review question.
- Answer:
- What are critical considerations when dismissing an employee? Do they change according to whether the departure is friendly or hostile, or according to which position the employee is leaving?
- Answer:
- How do security considerations for temporary or contract employees differ from those for regular full-time employees?
- Answer:
- What career paths do most experienced professionals take when moving into information security? Are other pathways available? If so, describe them.
- Answer:
- Why is it important to use specific and clearly defined job descriptions for hiring information security professionals?
- Answer:
- What functions does the CISO perform?
- Answer:
- What functions does the security manager perform?
- Answer:
- What functions does the security analyst perform?
- Answer:
- What rationale should an aspiring information security professional use in acquiring professional credentials?
- Answer:
- List some of the information security certifications mentioned in this module.
- Answer:
- Discuss the financial costs of certification. How expensive is the process?
- Answer:
- List and describe the standard personnel policies and practices that are part of the information security function.
- Answer:
- Why shouldn't an organization give a job candidate a tour of secure areas during an interview?
- Answer:
- List and describe the typical relationships that organizations have with temporary employees, contract employees, consultants, and business partners. What special security precautions must an organization consider for such workers, and why are they significant?
- Answer:
- What is separation of duties? How can it be used to improve an organization's information security practices?
- Answer:
- What is job rotation, and what benefits does it offer an organization?
- Answer:
Part TwoHands-On Project: Microsoft OS Processes and Services
Complete the Hands-On Project: Microsoft OS Processes and Services
After completing the hands-on project, answer the following prompts
Self-Reflection and Response
What is the difference between a process and a service in the Windows operating system?
Can you think of why you would need to be able to determine which processes are running on your Windows computer?
Can you think of why you would need to be able to determine which services are running on your Windows computer?
Hands-On Project: Backup and Recovery and File Integrity Monitoring
Complete the Hands-On Project: Backup and Recovery and File Integrity Monitoring
After completing the hands-on project, answer the following prompts
Self-Reflection and Response
Have you chosen to make a backup copy of your computer system? In the space below, explain why or why not. What steps did you take (or will you take in the future) to research and implement your method?
Can you think of another reason, not mentioned in the lab, for using the File Integrity monitor featers found in PowerShell? Describe how you might use it.
Were you able to install and use the hashing tools from MaresWare? What was your experience using these tools?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started