List of questions
Related questions
Question 173 - 312-38 discussion
Which of the following procedures is intended to provide security personnel to identify, mitigate, and recover from malware events, such as unauthorized access to systems or data, denial-of-service or unauthorized changes to the system hardware, software, or information?
A.
None
B.
disaster survival plan
C.
Cyber Incident Response Plan
D.
A resident of the emergency plan
E.
Crisis communications guidelines
Your answer:
0 comments
Sorted by
Leave a comment first