Question 1 The cyber incident-handling process includes... Notification, Respons
ID: 334881 • Letter: Q
Question
Question 1
The cyber incident-handling process includes...
Notification, Response, Documentation, Recovery and Follow-up
Discovery, Disclosure, Investigation, Arrest
Identification, Active Defense, Restoration, Hack Back
Question 2.
A private company that is victim of a significant cyber attack has the legal right to 'hack back' the perpetrator.
True
False
Question 3
A data breach must always be disclosed as soon as it is discovered in order to protect customers and end users, regardless of whether or not there is a requirement to do so.
True
False
Explanation / Answer
Question 1: Option A - Notification, Response, Documentation, Recovery and Follow-up
Question 2: False - Hacking is unethical and illegal so the company cannot hack back when they are attacked.
Question 3: True - The safety of the information of the customers is very important. So the company should disclose as soon as the data has been hacked.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.