List of questions
Related questions
Question 278 - CISM discussion
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
A.
Dump all event logs to removable media
B.
Isolate the affected network segment
C.
Enable trace logging on ail events
D.
Shut off all network access points
Your answer:
0 comments
Sorted by
Leave a comment first