New zero-day attacks are announced on a regular basis against a broad range of technology systems. Which of the following best practices should you do first to manage the risks of these attack vectors?
A. Back up all device configurations.
B. Establish an emergency response process.
C. Create an inventory of applications and critical systems.
D. Update all network diagrams.
C
Explanation: To manage the risks of zero-day attacks, you should create an inventory of applications and critical systems. This will allow you to identify which systems are affected by zero-day attacks when they are discovered.
None of the other practices are as important as the application and system inventory.
You might also like to view...
Using examples, illustrate the different types of adaptor needed to support sequential composition, hierarchical composition and additive composition.
What will be an ideal response?
Look up how to do quicksort. Write a method to do quicksort of an array of names.
What will be an ideal response?
Why shouldn't users rely on Flash animation for their sites?
What will be an ideal response?
Choose Butt Caps for squared ends of a stroked path.
Answer the following statement true (T) or false (F)