List of questions
Related questions
Question 274 - 200-201 discussion
Refer to the exhibit.
A suspicious IP address is tagged by Threat Intelligence as a brute-force attempt source After the attacker produces many of failed login entries, it successfully compromises the account. Which stakeholder is responsible for the incident response detection step?
A.
employee 5
B.
employee 3
C.
employee 4
D.
employee 2
Your answer:
0 comments
Sorted by
Leave a comment first