226,549 views
3 votes
3 votes
Match each item with a statement below. 1. Defines roles and responsibilities for information security 2. Too risky for most businesses 3. A single trainer works with multiple trainees in a formal setting 4. Trainees receive a seminar presentation at their computers 5. Usually activated when an incident causes minimal damage with little or no disruption to business operations 6. A source of information for developing IR policy 7. A review of an unusual pattern of entries in a system log 8. An online resource for IR 9. Can serve as a training case for future staff

User Shiju
by
3.5k points

2 Answers

3 votes
3 votes

Answer:

Match each item with a statement below.

1. Defines roles and responsibilities for information security = IR Policy

2. Too risky for most businesses = Full Interruption testing

3. A single trainer works with multiple trainees in a formal setting = Formal class learning

4. Trainees receive a seminar presentation at their computers = Distance Learning

5. Usually activated when an incident causes minimal damage with little or no disruption to business operations = IR plan

6. A source of information for developing IR policy = Organizational charts

7. A review of an unusual pattern of entries in a system log = Trigger

8. An online resource for IR = CERT Coordination Center

9. Can serve as a training case for future staff = After action review

Step-by-step explanation:

1. IR policy is defined as Incident response policy. It is a policy that tells us the functions that the Information Security carries out in a particular business or enterprise.

2. Full Interruption testing is a process or procedure that helps to coordinates the disaster recovery plan for most businesses. It is quite risky for most businesses.

3. Formal class learning : Formal learning is a process where by Students have to attend classes physically and they are taught by a Teacher or a Trainer.

4. Distance Learning: This is a means or form or learning where students don't need to attend classes physically at a school or college. Lecture, Seminars , Exams can be assessed y the students online through their computers.

5. IR Plan : This is the plan that is put in place and it is implemented when a situation occurs at this businesses that results in minimal damage

6. Organization charts : They consist necessary information or data that can be used to develop or create an IR policy.

7. Trigger: This is activated when after checking the logs found in a system, an unusual pattern of entries is observed or noticed.

8. CERT Coordination Center: This is a coordination center where we can information or get adequate knowledge on IR.

9. After Action review: It is used to a means or way for a group of people working on a particular project to learn from their mistakes. It also helps them to be able to improve on any future tasks they will be taking on together. It can be used as a training case for future staff.

User Fredrik Haglund
by
2.9k points
1 vote
1 vote

Answer:

1 and 6, 3 and 4, 8 and 9, 2 and 7

Step-by-step explanation:

1 and 6: For developing IR policy, roles and responsibilities for informatino security must be clearly defined

3 and 4: a single trainer working with multiple trainees is trainees receiving presentation

8 and 9: An online resource for IR can serve as a training case for staff

2 and 7: an unsual pattern in a system log can be risky for the business

User Sffc
by
2.9k points