A(n) ____ outlines the actions to be performed when a security breach occurs.
A. risk identification
B. threat modeling
C. risk management
D. incident response
Answer: D
Computer Science & Information Technology
You might also like to view...
You can only have one primary key in a table, but you can have several foreign keys
Indicate whether the statement is true or false
Computer Science & Information Technology
A firewall can be configured to disallow certain types of incoming traffic that may be attacking
Indicate whether the statement is true or false.
Computer Science & Information Technology