ExamGecko
Question list
Search
Search

Question 789 - CISM discussion

Report
Export

Identifying which of the following BEST enables a cyberattack to be contained?

A.
The vulnerability exploited by the attack
Answers
A.
The vulnerability exploited by the attack
B.
The segment targeted by the attack
Answers
B.
The segment targeted by the attack
C.
The IP address of the computer that launched the attack
Answers
C.
The IP address of the computer that launched the attack
D.
The threat actor that initiated the attack
Answers
D.
The threat actor that initiated the attack
Suggested answer: B
asked 01/10/2024
Rehan Malik
51 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first