Incident may be reported using/ by:
Correct Answer:D
Insiders may be:
Correct Answer:D
The ability of an agency to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy is known as:
Correct Answer:B
In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the system identified?
Correct Answer:C
A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be presented in a court of law in a coherent and meaningful format is called:
Correct Answer:B
Which of the following may be considered as insider threat(s):
Correct Answer:B