A new employee is starting work at your company. When should they be informed of the company’s security policy?
An Internet-connected file server compromised by a threat that leaked all datA. The data was destroyed to cover all tracks. The file server has high availability capabilities to handle critical workloads. The operations team took only 15 minutes to restore workload routing to a different node.
What part(s) of the CIA Triad was affected?
You have been tasked with documenting mission critical procedures of an organization that need to be
sustained through a significant disruption.
What document would you develop?
Which document is designed to limit damage, reduce recovery time, and reduce costs where possible to the organization?
The Backup Recovery Plan is dependent on what effort?
What determines the technical controls used to restrict access to USB devices and help prevent their use
within a company?
What does a security benchmark help define?
An organization has a policy to respond “ASAP” to security incidents. The security team is having a difficult time prioritizing events because they are responding to all of them, in order of receipt.
Which part of the IRP does the team need to implement or update?
What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?