General Instructions:
1. This is a closed-book, closed-notes quiz. No reference material (including assignments and labs) will be permitted for use during the quiz session.
2. The quiz contains the following types of questions:
Short essay type
3. Place your answers in the space immediately following each question.
Quiz Questions
1. What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.
2. Describe what the three models are for a CIRT plan based on the NIST SP 800-61 template.
3. Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.
4. As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users.
5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.
6. Define a DRP and explain when it is invoked.
7. Describe two CSFs for a DRP.
8. Explain what Recovery Time Objective (RTO) is and why the DRP needs to be written to meet it.
9. Describe the advantages and disadvantages for each of the DRP location possibilities.
10. List and describe four of the costs associated with a DRP.
Student Answer Sheet
DATE: ____________________________
STUDENT NAME: ____________________________
COURSE NUMBER: ____________________________
INSTRUCTOR: ____________________________
SCHOOL LOCATION: ____________________________
General Instructions:
Answer each question in the space provided below
You May Also Find These Documents Helpful
-
A physical count of merchandise inventory on November 30 reveals that there are 90 units on hand. Assume a periodic inventory system is used. Ending inventory under LIFO is…
- 826 Words
- 4 Pages
Satisfactory Essays -
in terms of bandwidth and storage. Your company has never traded with the U.S. Government at this…
- 348 Words
- 2 Pages
Satisfactory Essays -
1. Identify areas that were not addressed by the IT staff’s response to the incident.…
- 799 Words
- 3 Pages
Good Essays -
Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…
- 748 Words
- 6 Pages
Satisfactory Essays -
In this paperwork of IT 244 Week 3 Individual Disaster Recovery Plan you will find the next information:…
- 419 Words
- 2 Pages
Satisfactory Essays -
1. This assignment should be a planning proposal, as defined in our text, Technical Communication . The purpose of the proposal is to provide a solution to a problem or suggestions for improvement of a situation.…
- 633 Words
- 3 Pages
Better Essays -
Q2: Explain “meaningful and achievable objectives of a project”. Please give 1 example of each.…
- 1439 Words
- 6 Pages
Satisfactory Essays -
7. When the researcher measures a behavior that needs to be changed, applies therapy and measures the behavior again, and then removes the treatment and measures the behavior again, this is referred to as ABA design.…
- 604 Words
- 3 Pages
Satisfactory Essays -
Understanding what contributes toward business success is essential for a new business owner. Learning from your mistakes or the mistakes of others is essential to a successful business.…
- 341 Words
- 2 Pages
Satisfactory Essays -
6) Explain insurance needs short-term, intermediate-term, and long-term based on the development of your personal financial plan.…
- 129 Words
- 1 Page
Satisfactory Essays -
Due in Week Three: For your selected scenario, describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP.…
- 614 Words
- 3 Pages
Satisfactory Essays -
By identifying the vulnerabilities and potential attacks we can mitigate the risks to minimal. The recommendations stated above will improve our security and by continuous monitoring and updating we will keep the attacks to acceptable level. Our defined acceptable level should be no leakage from our company’s sensitive data.…
- 1074 Words
- 5 Pages
Better Essays -
5. Describe collaborative planning and Collaboration, Planning, Forecasting and Replenishing (CPFR), and list their benefits.…
- 3293 Words
- 14 Pages
Satisfactory Essays -
1. What have been the goals of the strategic planning exercise at RACC over the years? What are the advantages and disadvantages of the RACC approach?…
- 1019 Words
- 5 Pages
Good Essays -
a. What is the term given to the act of downloading software illegally from the Internet or copying software without permission?…
- 254 Words
- 2 Pages
Satisfactory Essays