Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks.Which of the following would have allowed the security team to use historical information to protect against the second attack?

A. Key risk indicators
B. Lessons learned
C. Recovery point objectives
D. Tabletop exercise


Answer: B. Lessons learned

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. A VBox’s Spacing property specifies vertical spacing between its controls. b. Setting a control’s Max Width property to MAX_VALUE enables the control to fill its parent node’s width. c. A control’s On Mouse Dragged event handler (located under the Mouse heading in the Code section) specifies what to do when the user drags the mouse on the control. d. Each of these statements is true.

Computer Science & Information Technology

Applying the COUNT function to a ________ table will result in only the displayed table rows being counted

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) _________________________ is a good way to compare visually a small set of numbers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you publish a monthly newsletter, you can apply ________ to article headings

Fill in the blank(s) with correct word

Computer Science & Information Technology