Which of the following should be verified during incident response activities to determine the possible impact of the incident?

A laptop is recovered a few days after it was stolen.

Which of the following should be verified during incident response activities to determine the possible impact of the incident?
A . Full disk encryption status
B . TPM PCR values
C . File system integrity
D . Presence of UEFI vulnerabilities

Answer: D

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments