Is defined as the process of identifying, estimating and prioritizing risks
What is knowledge based authentication
A company performs an analysis of its information systems requirements functions and interdependences in order to prioritize contingency requirement. What is this process called?
What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?
The highest-level governance documents in an organization, usually approved and issued by management, usually to support a compliance initiative
Which is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network.
Which is an authorized simulated attack performed on a computer system to evaluate its security.
What is the priority of incident response in the context of incident management
True or False? The IT department is responsible for creating the organization's business continuity plan
Which of the following is unlikely to be a member of the disaster recovery team