What risk mitigation security controls or security countermeasures do you recomm
ID: 3723297 • Letter: W
Question
What risk mitigation security controls or security countermeasures do you recommend for the portion of the network that you built a CIRT response plan? Explain your answer
How does a CIRT plan help an organization mitigate risk?
How does a CIRT response plan help mitigate risk?
How does the CIRT post-mortem review help mitigate risk?
Why is it a good idea to have a protocol analyzer as one of your incident response tools when examining IP LAN network performance or connectivity issues?
Which step in the CIRT response methodology relates back to RTO for critical IT systems
Which step in the CIRT response methodology requires proper handling of digital evidence?
Which step in the CIRT response methodology requires review with executive management?
Which step in the CIRT response methodology requires security applications and tools readiness?
Explanation / Answer
What risk mitigation security controls or security countermeasures do you recommend for the portion of the network that you built a CIRT response plan?
Answer:
Keep systems up to date because some patches and updates havesecurity to stop bugs and vulnerabilities from causing securityvulnerabilities.Enable firewalls because firewalls will filter traffic to ensure thatunwanted traffic does not reach vulnerable systems.
How does a CIRT plan help an organization mitigate risk?
Answer:
It helps an organization prepare for incidents. When prepared, the organization isable to respond to the incidents much quicker and with focused action.
How does a CIRT response plan help mitigate risk?
Answer:
To respond to the incidents much quicker and with focused action
How does the CIRT post-mortem review help mitigate risk?
Answer:
A post-mortem report should include a complete explanation of theincident and the resolution and applicable configurationmanagement, security countermeasures, implementationrecommendations to prevent the security incident or breach fromoccurring again.
Why is it a good idea to have a protocol analyzer as one of your incident response tools when examining IP LAN network performance or connectivity issues?
Answer:
The protocol analyzer would need to investigate and analyze events to determine ifthey are actual incidents, or false positives.
Which step in the CIRT response methodology relates back to RTO for critical IT systems
Answer:
Step5)Recovery
Which step in the CIRT response methodology requires proper handling of digital evidence?
Answer:
Step2)Identification
Which step in the CIRT response methodology requires review with executive management?
Answer:
Step6)Post-Mortem Review
Which step in the CIRT response methodology requires security applications and tools readiness?
Answer:
Step1)Preparation
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.