List of questions
Related questions
Question 357 - CISM discussion
After a server has been attacked, which of the following is the BEST course of action?
A.
Initiate incident response.
B.
Review vulnerability assessment.
C.
Conduct a security audit.
D.
Isolate the system.
Your answer:
0 comments
Sorted by
Leave a comment first