CIS 359 Innovative Education--snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CIS 359 Innovative Education--snaptutorial.com

Description:

CIS 359 Final Exam Set 1 • Question 1 ____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of his or her latest conquest. – PowerPoint PPT presentation

Number of Views:9
Slides: 14
Provided by: Richardson72

less

Transcript and Presenter's Notes

Title: CIS 359 Innovative Education--snaptutorial.com


1
CIS 359 Innovative Education--snaptutorial.com
2
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Final Exam Set 1 For more classes
visit www.snaptutorial.com  CIS 359 Final Exam
Set 1 Question 1 ____ are likely in the event
of a hacker attack, when the attacker retreats to
a chat room and describes in specific detail to
his or her associates the method and results of
his or her latest conquest. Question 2
Contingency strategies for ____ should emphasize
the need for absolutely reliable data backup and
recovery procedures because they have less
inherent redundancy than a distributed
architecture.
3
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Midterm Exam Set 1 For more classes
visit www.snaptutorial.com   CIS 359 Midterm Exam
Set 1  Question 1   A CSIRT model that is
effective for large organizations and for
organizations with major computing resources at
distant locations is the ____.   Question 2  The
first group to communicate the CSIRTs vision and
operational plan is the managerial team or
individual serving as the ____.
4
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Midterm Exam Set 2 For more classes
visit www.snaptutorial.com   1. One of the
primary responsibilities of the IRP team is to
ensure that the ____ is prepared to respond to
each incident it may face.   2. A(n) ____ is
a detailed examination of the events that
occurred, from first detection of an incident to
final recovery.   3. ____ is the process of
systematically examining information assets for
evidentiary material that can provide insight
into how an incident transpired.
5
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Midterm Exam Set 3 For more classes
visit www.snaptutorial.com   CIS 359 Midterm Exam
Set 3   Question 1   When using
virtualization, it is commonplace to use the term
____ to refer to a virtualized environment
operating in or on a host platform.  
Question 2  A(n) ____ backup only archives
the files that have been modified since the last
backup.
6
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Week 1 Discussion For more classes
visit www.snaptutorial.com   From the e-Activity,
explain in your own words what you believe CP
attempts to provide for an organization, and
describe what you believe is the most important
CP consideration for an organization. Provide a
rationale for your answer.
7
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Week 2 Assignment 1 Continuity Planning
Overview For more classes visit www.snaptutorial
.com   Assignment 1 Continuity Planning
Overview Due Week 2 and worth 75 points Suppose
you were recently hired for a new initiative as a
business continuity lead / manager at a
medium-sized healthcare company. You have been
asked to prepare a presentation to the Board of
Directors on your main duties for the company and
how your position could help protect the business
in case of a large-scale incident or disaster.
You have been alerted that since this is a new
initiative and could come with a potentially
large price tag, there is skepticism from some of
the Board members.
8
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Week 3 Case Study 1 Stuxnet and U.S.
Incident Response For more classes
visit www.snaptutorial.com   Case Study 1
Stuxnet and U.S. Incident Response   Due Week 3
and worth 100 points Read the article titled
When Stuxnet Hit the Homeland Government
Response to the Rescue, from ABC News, located
athttp//abcnews.go.com/blogs/headlines/2012/06/wh
en-stuxnet-hit-the-homeland-government-response-to
-the-rescue/ and consider this threat in terms of
incident response and recovery procedures.
9
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Week 4 Assignment 2 Incident Response
(IR) Revamp For more classes visit www.snaptutor
ial.com   Assignment 2 Incident Response (IR)
Revamp   Due Week 4 and worth 75 points  
Imagine you have just taken over the manager
position for your organizations incident
response team, after coming from another division
in the company. Your first realization is that
proper procedures, best practices, and sound
technologies are not being utilized. You decide
to revamp the teams efforts.
10
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Week 6 Assignment 3 Incident Response
(IR) Strategic Decisions For more classes
visit www.snaptutorial.com   Assignment 3
Incident Response (IR) Strategic Decisions   Due
Week 6 and worth 75 points   Suppose that you
have been alerted of a potential incident
involving a suspected worm spreading via buffer
overflow techniques, compromising Microsoft IIS
Web servers. As the IR Team leader, it is your
responsibility to determine the next steps.
11
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Week 7 Case Study 2 Disaster Recovery
(DR) Lessons Learned September 11th For more
classes visit www.snaptutorial.com   Case Study
2 Disaster Recovery (DR) Lessons Learned
September 11th  Due Week 7 and worth 100
points  Read the article titled 9/11 Top
lessons learned for disaster recovery, from
Computerworld.com, located athttp//www.computerwo
rld.com/s/article/9219867/9_11_Top_lessons_learned
_for_disaster_recovery, and consider the effects
the attacks of September 11, 2001, have had on
technology recovery efforts.
12
CIS 359 Innovative Education--snaptutorial.com
CIS 359 Week 10 Term Paper Contingency Planning
in Action For more classes visit www.snaptutoria
l.com   Term Paper Contingency Planning in
Action   Due Week 10 and worth 200 points Create
a hypothetical organization with details
including geographic location(s), number of
employees in each location, primary business
functions, operational and technology details,
potential threats to the business and its
technology, and anything else that you believe is
relevant to the business.
13
CIS 359 Innovative Education--snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com