A(n) ____ outlines the actions to be performed when a security breach occurs.

A. risk identification
B. threat modeling
C. risk management
D. incident response


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following characters is not a Microsoft Agent character provided by Microsoft?

a) Merlin b) Peedy c) Robby d) Genie e) Aladdin

Computer Science & Information Technology

To test a document's animation on the Stage, you click the Play command on the Control menu or press the ____ key on the keyboard.

A. Esc B. F4 C. Enter D. Tab

Computer Science & Information Technology

Which of the following actions CANNOT be performed in the Photo Album dialog box?

A) Cropping a picture B) Formatting a picture C) Previewing a picture D) Listing added pictures

Computer Science & Information Technology

If nums is a two-dimensional integer array, *(*(nums + 2) + 1) refers to element nums[1][2].

Answer the following statement true (T) or false (F)

Computer Science & Information Technology