List of questions
Related questions
Question 127 - CISM discussion
Network isolation techniques are immediately implemented after a security breach to:
A.
preserve evidence as required for forensics
B.
reduce the extent of further damage.
C.
allow time for key stakeholder decision making.
D.
enforce zero trust architecture principles.
Your answer:
0 comments
Sorted by
Leave a comment first