List of questions
Related questions
Question 68 - 312-38 discussion
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service, or unauthorized changes to system hardware, software, or data?
A.
Cyber Incident Response Plan
B.
Crisis Communication Plan
C.
Disaster Recovery Plan
D.
Occupant Emergency Plan
Your answer:
0 comments
Sorted by
Leave a comment first