List of questions
Related questions
Question 190 - CISM discussion
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
A.
Containment
B.
Recovery
C.
Eradication
D.
Identification
Your answer:
0 comments
Sorted by
Leave a comment first