Which of the following procedures is designed to enable security personnel to identify, mitigate…?

Which of the following procedures is designed to enable security personnel to identify, mitigate,
and recover from malicious computer incidents, such as unauthorized access to a system or data,
denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

Which of the following procedures is designed to enable security personnel to identify, mitigate,
and recover from malicious computer incidents, such as unauthorized access to a system or data,
denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

A.
Cyber Incident Response Plan

B.
Crisis Communication Plan

C.
Occupant Emergency Plan

D.
Disaster Recovery Plan

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *