CIS 359 Education on your terms-tutorialrank.com - PowerPoint PPT Presentation

About This Presentation
Title:

CIS 359 Education on your terms-tutorialrank.com

Description:

For more course tutorials visit www.tutorialrank.com CIS 359 Final Exam Set 1 CIS 359 Final Exam Set 2 – PowerPoint PPT presentation

Number of Views:17
Slides: 18
Provided by: SeatonWearn

less

Transcript and Presenter's Notes

Title: CIS 359 Education on your terms-tutorialrank.com


1
CIS 359 Education on your terms/tutorialrank.com
2
CIS 359Education on your terms/tutorialrank.com
CIS 359 Final Exam All 2 Set For more course
tutorials visit www.tutorialrank.com CIS 359
Final Exam Set 1 CIS 359 Final Exam Set 2
3
CIS 359Education on your terms/tutorialrank.com
CIS 359 Final Exam Set 1 For more course
tutorials visit www.tutorialrank.com CIS 359
Final Exam Set 1 Question 1
____ are likely in the event of a hacker
attack, when the attacker retreats to a chat room
and describes in specific detail to his or her
associates the method and results of his or her
latest conquest.
4
CIS 359Education on your terms/tutorialrank.com
CIS 359 Final Exam Set 2 For more course
tutorials visit www.tutorialrank.com CIS 359
Final Exam Set 2 Question 1
A continuously changing process presents
challenges in acquisition, as there is not a
fixed state that can be collected, hashed, and so
forth. This has given rise to the concept of ____
forensics which captures a point-in-time picture
of a process.
5
CIS 359Education on your terms/tutorialrank.com
CIS 359 Midterm Exam All 3 Set For more course
tutorials visit www.tutorialrank.com CIS 359
Midterm Exam Set 2 CIS 359 Midterm Exam Set 1
CIS 359 Midterm Exam Set 3
6
CIS 359Education on your terms/tutorialrank.com
CIS 359 Midterm Exam Set 1 For more course
tutorials visit www.tutorialrank.com CIS 359
Midterm Exam Set 1 Question 1 A CSIRT model
that is effective for large organizations and for
organizations with major computing resources at
distant locations is the ____.
7
CIS 359Education on your terms/tutorialrank.com
CIS 359 Midterm Exam Set 2 For more course
tutorials visit www.tutorialrank.com One of the
primary responsibilities of the IRP team is to
ensure that the ____ is prepared to respond to
each incident it may face. A(n) ____ is a
detailed examination of the events that occurred,
from first detection of an incident to final
recovery. ____ is the process of systematically
examining information assets for evidentiary
material that can provide insight into how an
incident transpired.
8
CIS 359Education on your terms/tutorialrank.com
CIS 359 Midterm Exam Set 3 For more course
tutorials visit www.tutorialrank.com CIS 359
Midterm Exam Set 3 Question 1 When
using virtualization, it is commonplace to use
the term ____ to refer to a virtualized
environment operating in or on a host platform.
9
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 1 Discussion For more course
tutorials visit www.tutorialrank.com From the
e-Activity, explain in your own words what you
believe CP attempts to provide for an
organization, and describe what you believe is
the most important CP consideration for an
organization. Provide a rationale for your answer.
10
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 2 Assignment 1 Continuity Planning
Overview For more course tutorials
visit www.tutorialrank.com Assignment 1
Continuity Planning Overview Due Week 2 and
worth 75 points
11
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 3 Case Study 1 Stuxnet and US
Incident Response For more course tutorials
visit www.tutorialrank.com Case Study 1
Stuxnet and U.S. Incident Response Due Week 3
and worth 100 points Read the article titled
When Stuxnet Hit the Homeland Government
Response to the Rescue, from ABC News, located
at http//abcnews.go.com/blogs/headlines/2012/06/w
hen-stuxnet-hit-the-homeland-government-response-t
o-the-rescue/ and consider this threat in terms
of incident response and recovery procedures.
12
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 4 Assignment 2 Incident Response
(IR) Revamp For more course tutorials
visit www.tutorialrank.com Assignment 2
Incident Response (IR) Revamp Due Week 4 and
worth 75 points Imagine you have just taken over
the manager position for your organizations
incident response team, after coming from another
division in the company. Your first realization
is that proper procedures, best practices, and
sound technologies are not being utilized. You
decide to revamp the teams efforts.
13
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 6 Assignment 3 Incident Response
(IR) Strategic Decisions For more course
tutorials visit www.tutorialrank.com Assignment
3 Incident Response (IR) Strategic Decisions
Due Week 6 and worth 75 points Suppose that you
have been alerted of a potential incident
involving a suspected worm spreading via buffer
overflow techniques, compromising Microsoft IIS
Web servers. As the IR Team leader, it is your
responsibility to determine the next steps.
14
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 7 Case Study 2 Disaster Recovery
(DR) Lessons Learned September 11th For more
course tutorials visit www.tutorialrank.com
Case Study 2 Disaster Recovery (DR) Lessons
Learned September 11th Due Week 7 and worth
100 points
15
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 8 Assignment 4 Disaster Recovery
(DR) Team For more course tutorials
visit www.tutorialrank.com Assignment 4
Disaster Recovery (DR) Team Due Week 8 and worth
75 points Consider a scenario where the
contingency planning management team (CPMT) of
your organization has designated you as the
disaster recovery team leader, and the
preparation and planning of this component of the
security program is now under your purview with a
team of 11 employees including yourself.
16
CIS 359Education on your terms/tutorialrank.com
CIS 359 Week 10 Term Paper Contingency Planning
in Action For more course tutorials
visit www.tutorialrank.com Term Paper
Contingency Planning in Action Due Week 10 and
worth 200 points Create a hypothetical
organization with details including geographic
location(s), number of employees in each
location, primary business functions, operational
and technology details, potential threats to the
business and its technology, and anything else
that you believe is relevant to the business.
17
CIS 359Education on your terms/tutorialrank.com
Write a Comment
User Comments (0)
About PowerShow.com