In addition to compiling the list of user access requirement…

In addition to compiling the list of user access requirements, applications, and systems, the business impact analysis (BIA) also includes processes that are __________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.

The goal of conducting an incident analysis is to ascertain…

The goal of conducting an incident analysis is to ascertain weakness. Because each incident is unique and might necessitate a distinct set of approaches, a range of steps can be pursued to aid the analysis. One of these steps is to __________, which entails mapping network traffic according to the time of day and looking for trends.

When reporting incidents, the process of incident classifica…

When reporting incidents, the process of incident classification is known as triage. When triage is set in motion, the severity of the threat is assessed. Which of the following severity levels applies when limited disruptions to business as usual (BAU) operations are detected, automated controls failed to prevent the event, and no unauthorized activity is detected?