List of questions
Related questions
Question 36 - CISM discussion
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
A.
Cost of the attack to the organization
B.
Location of the attacker
C.
Method of operation used by the attacker
D.
Details from intrusion detection system (IDS) logs
Your answer:
0 comments
Sorted by
Leave a comment first