Answer:
The answer is "assessment"
Explanation:
In the given question some information is missing, that is options that can be described as follows:
a) containment strategy.
b) assessment.
c) incident response.
d) disaster assessment.
Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.
- In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce.
- This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:
- In option a, It is a part of world war II, that's why it is wrong.
- In option c, It is a method that is sort major incident, that's why it is wrong.
- In option d, It uses cost control and risk avoidance, that's why it is wrong.
Pendrive, CD is local storage divices
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.
Answer:
"A class that inherits from two classes"
Explanation:
If we're talking about Java, you can't extend from two classes. The reason for this is Java doesn't allow multiple inheritance.
The reason for this is to avoid the ambiguity caused by it. One of the cases where multiple inheritance can cause ambiguity is the diamond problem.
Diamond problem can occur if two classes (say B and C) inherit from one class (say A). And another class (say D) inherits from both B & C.
If B and C class override the same method from A class. And D class calls that method, which one will be called, class B's or C's??
Answer:
Two profiles, one record type, two page layouts.
Explanation:
Record types and functions allow you to present forward different business processes, pick-list values, as well as page layouts to diverse range of users based on their profiles.
Going by the question, we can conclude that the minimum necessary configuration in order to meet the requirement in the question above are:Two profiles, one record type, two page layouts.