The process of updating the information about an incident as it is processed and as information is added to the incident record is called incident ____.
A. authentication
B. tracking
C. escalation
D. archiving
Answer: B
You might also like to view...
What steps should be taken to lock down a WiFi network?
a. No SSID broadcast, non-default SSID, MAC access control, and WEP encryption b. No SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption c. SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption d. SSID broadcast, non-default SSID, MAC access control, WEP encryption, and RADIUS authentication
A standard monitor has an on-screen show ratio of ____.
A. 3:4 B. 1:2 C. 16:9 D. 4:3
When using command-line terminal, specific letters that start with a dash ("-") and appear after command names are considered to be:
A. Arguments B. Options C. Keywords D. Metacharacters
Under some circumstances, the baud rate may equal the bps, such as in the Manchester encoding schemes.?
Answer the following statement true (T) or false (F)