ISC CC - CC - Certified in Cybersecurity
What is the purpose of the post incident phase of incident response?
Which plan provides the team with immediate response procedures and check lists and guidance for management?
Example of Technical controls
Which type of software testing focuses on examining the source code for vulnerabilities and security issues?
Which of these is an example of deterrent control
Which of the following is endpint
Communication between end systems is encrypted using a key, often known as________?
Which OSI layer VPN works
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______
Which type of control is used to minimize the impact of an attack and to restore normal operations as quick as possible