List of questions
Related questions
Question 789 - CISM discussion
Identifying which of the following BEST enables a cyberattack to be contained?
A.
The vulnerability exploited by the attack
B.
The segment targeted by the attack
C.
The IP address of the computer that launched the attack
D.
The threat actor that initiated the attack
Your answer:
0 comments
Sorted by
Leave a comment first