The process of updating the information about an incident as it is processed and as information is added to the incident record is called incident ____.

A. authentication
B. tracking
C. escalation
D. archiving


Answer: B

Computer Science & Information Technology

You might also like to view...

What steps should be taken to lock down a WiFi network?

a. No SSID broadcast, non-default SSID, MAC access control, and WEP encryption b. No SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption c. SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption d. SSID broadcast, non-default SSID, MAC access control, WEP encryption, and RADIUS authentication

Computer Science & Information Technology

A standard monitor has an on-screen show ratio of ____.

A. 3:4 B. 1:2 C. 16:9 D. 4:3

Computer Science & Information Technology

When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:

A. Arguments B. Options C. Keywords D. Metacharacters

Computer Science & Information Technology

Under some circumstances, the baud rate may equal the bps, such as in the Manchester encoding schemes.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology