New zero-day attacks are announced on a regular basis against a broad range of technology
systems. Which of the following best practices should a security manager do to manage the risks
of these attack vectors? (Select TWO).
A.
Establish an emergency response call tree.
B.
Create an inventory of applications.
C.
Backup the router and firewall configurations.
D.
Maintain a list of critical systems.
E.
Update all network diagrams.