What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?A . Disaster Recovery PlanB . Emergency Analysis PlanC . Crisis Communication PlanD . Incident Response Plan View Answer Answer: D Explanation: Reference: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf...

What must be included in the CMDB?

What must be included in the CMDB?A . Inventory of uninstalled softwareB . Software End User Licensing AgreementsC . Dependencies of installed componentsD . Known vulnerabilities of installed software View Answer Answer: C Explanation: Reference: https://docs.servicenow.com/bundle/london-servicenow-platform/page/product/configuration­management/concept/cnfig-mgmt-and-cmdb.html...

What is a consideration when performing data collection in Information Security Continuous Monitoring?

What is a consideration when performing data collection in Information Security Continuous Monitoring?A . Data collection efficiency is increased through automation.B . The more data collected, the better chances to catch an anomaly.C . Collection is used only for compliance requirements.D . Data is best captured as it traverses the network. View Answer Answer:...