COMPLETE COURSE SEC340 COMPLETE COURSE
Login
now
Register
now

Monday, 16 November 2015

COMPLETE COURSE SEC340 COMPLETE COURSE

SEC 340 COMPLETE COURSE SEC340 COMPLETE COURSE

Click below link for Answers

SEC 340 Week 5 Disaster Recovery Plan Paper

Disaster Recovery Plan
Students will submit a 750-1,000-word paper (double-spaced) this week, identifying and describing the key components of a comprehensive disaster recovery plan for any incident that could disrupt an organization's network and data. This paper should start with the composition of the disaster recovery team and their respective roles and responsibilities. The rubric for this assignment is located in Doc Sharing.


SEC 340 Week 6 You Decide

Sunshine Machine Works has an infrastructure which includes over 100 employees working within their one-story headquarters. Management needs a business continuity plan to help them continue with their business in the event of a serious incident.
You are an outside consultant brought in to provide some valuable insight and feedback for Sunshine Machine Works. This company has seen rapid growth and management is looking to you to provide critical input for a business continuity plan. Although they have a format they can use for the policy, they are looking to you to provide some guidance on areas they will need to address when creating this policy.
As the expert providing consulting services, you will want to identify and describe the key components of a comprehensive business continuity plan for an attack or incident which could affect Sunshine Machine Work's network and data. Follow the instructions provided in the You Decide Exercise: Business Continuity Plan.

SEC 340 Week 2 Quiz

1. (TCOs 1, 2, 4) Which of the following is not a critical element of the CIA triangle?
2. (TCOs 1, 2, 4) The risk that remains after a control has been applied is called _____.
3. (TCOs 1, 2, 4) Which part of the contingency plan provides detailed scenarios of the potential impact of each type of attack?
4. (TCOs 1, 2, 4) Who is responsible for obtaining senior management commitment and support at the outset of the planning process?
5. (TCOs 1, 2, 4) Who should set the policy for the contingency planning process?
6. (TCOs 1, 2, 4) The analysis of business _____ focuses on identifying which are the main revenue-producing operations.
7. (TCOs 3, 5) Which of the following is not a possible IR team structure model?
8. (TCOs 3, 5) The group of individuals who will respond to the incident are called the _____.
9. (TCOs 3, 5) An actual incident that occurs but is not reported is called a _____.
10. (TCOs 3, 5) Scanning a network for active systems and services is called _____.
Page 2
1. (TCOs 3, 5) The _____ should provide the incident response plan as its first deliverable.
2. (TCOs 3, 5) The successful execution of a _____ begins with admitting that there is a problem
3. (TCOs 3, 5) Confidentiality, integrity, and availability reflect upon the relative _____ of an information system
4. (TCOs 3, 5) Which of the following describes confidentiality?
5. (TCOs 3, 5) It cannot be denied that risk management _____.
6. (TCO 1) The _____ model of information security evolved from a concept known as the CIA triangle
7. (TCO 1) Which of the following can become the basis for an attack on information?
8. (TCOs 2, 4) The _____ takes up where the risk assessment process leaves off
9. (TCO 5) A false positive is a non-event that is categorized as _____.
10. (TCO 5) False positives or noise often result from which of the following causes in an incident collection candidate?

SEC 340 Week 4 Quiz

1. (TCO 7) What type of backup site provides some of the same services and options of the hot site, but typically without software applications included, installed, or configured?
2. (TCO 7) Technologies designed to replace operating systems and services when they fail are called what?
3. (TCO 7) Which of the following is not one of the three possible backup strategies?
4. (TCO 6) CERT provides _____ best practices for responding to intrusions.
5. (TCO 6) A _____ roster requires that a contact person call each and every person on the roster.
6. (TCO 6) A hierarchical roster has _____ call certain other people on the roster, who in turn call other people on the roster
7. (TCO 6) Computer forensics has its roots in computer science and _____.
8. (TCO 6) The use of established _____ can facilitate the collection of legally defensible evidentiary material
9. (TCO 7) The grandfather-father-son method of backup allows recovery of data for the previous _____ weeks
10. (TCO 7) The Towers of Hanoi is more complex than other backup approaches and is based on _____ to optimize media wear
Page 2
1. (TCO 6) An IDS that collects statistical summaries and comparisons to normal traffic is known as a
2. (TCO 6) Which of the following is not one of the general philosophies of response?
3. (TCO 6) A simulation of a real event in a test environment is called a _____.
4. (TCO 6) Which of the following is not a technical aspect of analyzing evidentiary material?
5. (TCO 6) When analyzing the cost of an incident, which of the following should be considered?
6. (TCO 7) A business resumption plan is considered to have two major elements, which are:
7. (TCO 7) There are _____ key procedural mechanisms which facilitate the restoration of critical information and the continuation of business operations
8. (TCO 7) First, regardless of the strategy, _____ and on-site storage must be secured.
9. (TCO 7) Overall, the _____-tape rotation method of backup offers roughly two weeks of recovery capability
10. (TCO 7) Which form of RAID is used to balance safety and redundancy against the costs of acquiring and operating the systems?

SEC 340 All 7 Weeks Discussions

SEC 340 Week 1 DQ 1 Risk Management
SEC 340 Week 1 DQ 2 Threats and Attacks
SEC 340 Week 2 DQ 1 Incident Response Development
SEC 340 Week 2 DQ 2 The Sparks Chronicles
SEC 340 Week 3 DQ 1 Privacy and Regulatory Issues
SEC 340 Week 3 DQ 2 Recovery Operations
SEC 340 Week 4 DQ 1 Data Backup, Recovery, and Storage Strategies
SEC 340 Week 4 DQ 2 Disaster Recovery Versus Business Continuity
SEC 340 Week 5 DQ 1 Disaster Recovery Plan Features
SEC 340 Week 5 DQ 2 Disaster Recovery Scenario
SEC 340 Week 6 DQ 1 RTO Versus RPO
SEC 340 Week 6 DQ 2 Alternate Sites
SEC 340 Week 7 DQ 1 CMP Versus CMT
SEC 340 Week 7 DQ 2 Crisis Communications

SEC 340 COMPLETE COURSE SEC340 COMPLETE COURSE

Click below link for Answers


 
© Copyright 2015 Work Bank Theme by Workbank