List of questions
Related questions
Question 44 - 200-201 discussion
Which step in the incident response process researches an attacking host through logs in a SIEM?
A.
detection and analysis
B.
preparation
C.
eradication
D.
containment
Your answer:
0 comments
Sorted by
Leave a comment first