New zero-day attacks are announced on a regular basis against a broad range of technology systems. Which of the following best practices should you do first to manage the risks of these attack vectors?

A. Back up all device configurations.
B. Establish an emergency response process.
C. Create an inventory of applications and critical systems.
D. Update all network diagrams.

C
Explanation: To manage the risks of zero-day attacks, you should create an inventory of applications and critical systems. This will allow you to identify which systems are affected by zero-day attacks when they are discovered.
None of the other practices are as important as the application and system inventory.

Computer Science & Information Technology

You might also like to view...

A dataset is a copy of the fields and records the application can access from a database.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Suppose the xMethod() is invoked from a main method in a class as follows, xMethod() is _________ in the class.

``` public static void main(String[] args) { xMethod(); } ``` a. a static method b. an instance method c. a static method or an instance method

Computer Science & Information Technology