+1835 731 5494 Email: instantessays65@gmail.com

organization has developed its first-ever computer security incident respon

$12.99

organization has developed its first-ever computer security incident response procedure 1. A security manager has been asked to investigate employee behavior on the part of a senior manager. The investigation has shown that the subject has suffered a serious lapse in judgment and has violated the organization’s code of conduct. The security manager has been asked to keep the results of the investigation a secret. How should the security manager respond? a. Leak the results of the investigation to the media b. Cover up the results of the investigation c. Deliver the results of the investigation and recommendations for next steps to his superiors d. Notify law enforcement 2. A forensics investigator has been asked to examine the workstation used by an employee who has been known to misbehave in the past. This investigation is related to more potential misconduct. What approach should the investigator take in this new investigation? a. Approach this investigation objectively, without regard to the history of this employee’s conduct b. Approach this investigation subjectively, given the history of this employee’s conduct c. Assume the employee is guilty and search for evidence to support this d. Assume the employee is innocent and search for evidence to refute this 3. The allegation that an employee has violated company policy by downloading child pornography onto a company workstation should result in: a. Notification of affected customers b. Termination of the employee c. The declaration of a security incident d. A forensic investigation and possible disciplinary action 4. An organization has developed its first-ever computer security incident response procedure. What type of test should be undertaken first? a. Parallel test b. Simulation c. Walkthrough d. Document review 5. An organization’s security incident management strategy consists of response procedures to be used when an incident occurs. What other measures should the organization undertake: a. None b. Develop proactive procedures to aid in incident prevention c. Train selected personnel on incident response procedures d. Partner with law enforcement on incident response procedures Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help

Reviews

There are no reviews yet.

Be the first to review “organization has developed its first-ever computer security incident respon”

Your email address will not be published. Required fields are marked *