Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks.Which of the following would have allowed the security team to use historical information to protect against the second attack?
A. Key risk indicators
B. Lessons learned
C. Recovery point objectives
D. Tabletop exercise
Answer: B. Lessons learned
You might also like to view...
Which of the following statements is true?
a. A VBox’s Spacing property specifies vertical spacing between its controls. b. Setting a control’s Max Width property to MAX_VALUE enables the control to fill its parent node’s width. c. A control’s On Mouse Dragged event handler (located under the Mouse heading in the Code section) specifies what to do when the user drags the mouse on the control. d. Each of these statements is true.
Applying the COUNT function to a ________ table will result in only the displayed table rows being counted
Fill in the blank(s) with correct word
A(n) _________________________ is a good way to compare visually a small set of numbers.
Fill in the blank(s) with the appropriate word(s).
If you publish a monthly newsletter, you can apply ________ to article headings
Fill in the blank(s) with correct word