In what phase of incident response are new countermeasures implemented?
A. Containment
B. Detection
C. Recovery
D. Eradication
Answer: C. Recovery
Computer Science & Information Technology
You might also like to view...
A(n) ____________________ file is one that has been damaged.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To change the default file format, you can use the ________ option in ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?
A. Route aggregation B. Address masquerading C. NAT D. Classless Inter-Domain Routing
Computer Science & Information Technology
What type of laws should a penetration tester or student learning hacking techniques be aware of?
A. local B. state C. federal D. all of the above
Computer Science & Information Technology