During which of the following phases of the Incident Response process should a security administrator define and implement general defense against malware?

A. Lessons Learned
B. Preparation
C. Eradication
D. Identification


Answer: B. Preparation

Computer Science & Information Technology

You might also like to view...

Given the sample file permission mask, AAABBBCCCDDD, which bits represents read, write, and execute permissions for a group, with the same octal values as for user permissions?

A. AAA B. BBB C. CCC D. DDD

Computer Science & Information Technology

Discuss the ways in which inheritance promotes software reuse, saves time during program development and helps prevent errors.

What will be an ideal response?

Computer Science & Information Technology

A text style contains formatting characteristics that are applies only to text, such as font size and font color

Indicate whether the statement is true or false

Computer Science & Information Technology

A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology