Questions

  1. Which of the following containment strategies is the most difficult to perform?

A) Physical
B) Network
C) Perimeter
D) Virtual

  1. A cyber security breach can have an impact on which of the following?

A) Confidentiality
B) Integrity
C) Availability
D) All of the above

  1. Attribution is critical and has to be completed for a successful incident investigation.

A) True
B) False

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.122.4