What is the most important consideration in regards to communicating findings from a security monitoring system?

A. Informing the public of each security violation
B. Speed of presentation
C. Linking each violation to a standard vulnerability reference, such as the CVE
D. Having the presentation include all details related to an event


Answer: B. Speed of presentation

Computer Science & Information Technology

You might also like to view...

Which of the following can automate the steps needed to open a form and navigate to a new, blank record?

A) A macro B) A navigation form C) A query D) A subform

Computer Science & Information Technology

Use the ________ command to change the display of headings in narrow columns or for multiple rows

A) Text Direction B) Change Direction C) Change Position D) Align Heading

Computer Science & Information Technology

Which standard was approved by NIST in late 2000 as a replacement for DES?

A. AES B. 3DES C. RSA D. Twofish

Computer Science & Information Technology

Which of the following connects the L2 cache to the processor?

A. PCI B. Frontside bus C. Backside bus D. System I/O bus

Computer Science & Information Technology