Systems diagramming
Network diagramming
Application diagramming
Database diagramming
Rate this question:
project manager
Crisis manager
Incident manager
Champion
Rate this question:
Wiretap Act
Pen/Trap Statute
Fourth amendment to the U.S. Constitution
Electronic Communication Protection Act
Rate this question:
Follow-on incidents
Blue bag operations
Black bag operations
War games
Rate this question:
Availability
Risk assessment
Integrity
Confidentiality
Rate this question:
Confidentiality
Risk assessment
Availability
Integrity
Rate this question:
Mitigation
Acceptance
Transference
Avoidance
Rate this question:
Business impact analysis (BIA)
Business continuity analysis (BCA)
Incident response analysis (IRA)
Threat analysis
Rate this question:
Integrity
Availability
Confidentiality
Risk assessment
Rate this question:
Contingency plan
Security plan
Threat plan
Social plan
Rate this question:
C.I.A. triangle
Asset classification
Strategic plan
Disaster recovery plan
Rate this question:
Acceptance
Avoidance
Mitigation
Inheritance
Rate this question:
Trespass
Polymorphism
Denial-of-service
Theft
Rate this question:
Threat
Intellectual property
Payload
Trojan horse
Rate this question:
Policy
Residual risk
Assessment
Business continuity plan
Rate this question:
Defense
Mitigation
Transference
Acceptance
Rate this question:
Strategic planning
Contingency planning
Enterprise information planning
Security planning
Rate this question:
DoS
Spyware
Trojan horse
Social engineering
Rate this question:
Incident
Trespass
Trojan horse
Risk
Rate this question:
Risk assessment
Mitigation plan
Risk management
Disaster recovery plan
Rate this question:
Avoidance
BC
DR
Risk assessment
Rate this question:
Programmers
Social engineers
Script kiddies
Cyberterrorists
Rate this question:
Disaster recovery plan
Risk assessment plan
Business continuity plan
Incident response plan
Rate this question:
Transference
Avoidance
Acceptance
Mitigation
Rate this question:
Organizational management and professionals
Information security management and professionals
Information technology management and professionals
Human resource management and professional
Rate this question:
Mission/business processes
Information assets
Contingency planning
Insurance costs
Rate this question:
Data management session
Forensic analysis
Facilitated data-gathering session
System log session
Rate this question:
Workload shift
Business disruption experience
Work-around procedure
Work outflow
Rate this question:
Downtime metrics
Mission
Information assets
Budget
Rate this question:
Departmental reports
System logs
Scheduled reports
Financial reports
Rate this question:
Human resource planning
Information security planning
Contingency planning
Relocation planning
Rate this question:
Champion
Crisis manager
Project manager
Incident manager
Rate this question:
Human resource management and professional
Information security management and professionals
Organizational management and professionals
Information technology management and professionals
Rate this question:
Community of interest
Incident response community
Network community
Database community
Rate this question:
Recovery criticality budgeting
Crisis management budgeting
Incident response budgeting
Risk assessment budgeting
Rate this question:
Contingency planning policy
Incident response policy
Disaster recovery policy
Cross-training policy
Rate this question:
Forensic analysis
Threat of attack analysis
Cross-training analysis
Business impact analysis
Rate this question:
Dependency objective
Training objective
Recovery time objective
Recovery point objective
Rate this question:
Prioritizing mission/business processes
Identifying recovery priorities
Budgeting for contingency operations
BIA data collection
Rate this question:
Human resource managers
Information security managers
Business managers
Physical plant managers
Rate this question:
Redundant equipment
Local area networks
Audit documentation
BIA questionnaires
Rate this question:
Dependency objective
Recovery point objective
Recovery time objective
Training objective
Rate this question:
Production schedule
Collaboration diagram
Focus group
IT application log
Rate this question:
Cloud storage sites
Electronic vaulting sites
Data archives
Data backups
Rate this question:
Continuous database protections
RAID Level 1+0 applications
Online backup applications
Legacy backup applications
Rate this question:
Virtual machine
Host platform
Hypervisor
Virtual hardware
Rate this question:
Continuous database protection
Legacy backup
RAID
Virtualization
Rate this question:
Differential
RAID
Disk-to-disk-to-cloud
Disk-to-disk-to-tape
Rate this question:
Nondisclosure agreement
Covenant not to compete
Intellectual property assurance
Statement of indemnification
Rate this question:
Covenant not to compete
Intellectual property assurance
Statement of indemnification
Nondisclosure agreement
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.