A(n) ____ outlines the actions to be performed when a security breach occurs.

A. risk identification
B. threat modeling
C. risk management
D. incident response

Answer: D

Computer Science & Information Technology

You might also like to view...

You can only have one primary key in a table, but you can have several foreign keys

Indicate whether the statement is true or false

Computer Science & Information Technology

A firewall can be configured to disallow certain types of incoming traffic that may be attacking

Indicate whether the statement is true or false.

Computer Science & Information Technology