List of questions
Related questions
Question 226 - H12-711 discussion
Which of the following is an action to be taken during the eradication phase in a cybersecurity emergency response? (multiple choice)
A.
Find Trojan horses, illegal authorizations, and system loopholes, and deal with them in a timely manner
B.
Revise security policies based on security incidents that occur, enable security auditing
C.
Block the behavior of the attack and reduce the impact
D.
Confirm the degree of damage caused by the security incident and report the security incident
Your answer:
0 comments
Sorted by
Leave a comment first