A security manager is preparing the training portion of an incident plan. Which of the following job roles should receive training on forensics, chain of custody, and the order of volatility?
A. System owners
B. Data custodians
C. First responders
D. Security guards
Answer: C. First responders
Computer Science & Information Technology
You might also like to view...
Consider the Web site for your college department. Not all of the users who visit the site have the same reasons that you do. Identify different groups of users who might come to the site. Hint: there are at least six different groups.
What will be an ideal response?
Computer Science & Information Technology
Given the array declaration, int a[20]; The first element is written as:
a. a[1] b. a[0] c. a d. a[20] e. a[19]
Computer Science & Information Technology
Forward and Back buttons are called ____________________ buttons.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology