What is the most important consideration in regards to communicating findings from a security monitoring system?
A. Informing the public of each security violation
B. Speed of presentation
C. Linking each violation to a standard vulnerability reference, such as the CVE
D. Having the presentation include all details related to an event
Answer: B. Speed of presentation
You might also like to view...
Which of the following can automate the steps needed to open a form and navigate to a new, blank record?
A) A macro B) A navigation form C) A query D) A subform
Use the ________ command to change the display of headings in narrow columns or for multiple rows
A) Text Direction B) Change Direction C) Change Position D) Align Heading
Which standard was approved by NIST in late 2000 as a replacement for DES?
A. AES B. 3DES C. RSA D. Twofish
Which of the following connects the L2 cache to the processor?
A. PCI B. Frontside bus C. Backside bus D. System I/O bus