The ____ function integrates the incident response activities into a substantive and appropriate response to each adverse event as it happens.

A. threat response management
B. risk response management
C. vulnerability response management
D. incident response management

Answer: D

Computer Science & Information Technology

You might also like to view...

When appending or creating a new table from an Import, the file that is being imported is called the ________ file

A) initial B) host C) source D) destination

Computer Science & Information Technology

A malicious individual used an unattended customer service kiosk in a busy store to change the prices of several products. The alteration was not noticed until several days later and resulted in the loss of several thousand dollars for the store. Which of the following would BEST prevent this from occurring again?

A. Password expiration B. Screen locks C. Inventory control D. Asset tracking

Computer Science & Information Technology