which procedure should be documented ahead of time to speed the communication of a network attack?

In a network security policy, which procedure should be documented ahead of time to speed the
communication of a network attack?

In a network security policy, which procedure should be documented ahead of time to speed the
communication of a network attack?

A.
restoration plans for compromised systems

B.
credentials for packet capture devices

C.
Internet service provider contact information

D.
risk analysis tool credentials

E.
a method of communication and who to contact



Leave a Reply 0

Your email address will not be published. Required fields are marked *