Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks.Which of the following would have allowed the security team to use historical information to protect against the second attack?

A. Key risk indicators
B. Lessons learned
C. Recovery point objectives
D. Tabletop exercise

Answer: B. Lessons learned

Computer Science & Information Technology

You might also like to view...

Cold-calling is a legitimate sales technique when selling stocks.

a. true b. false

Computer Science & Information Technology

________ occur when a website downloads harmful software onto your computer.

What will be an ideal response?

Computer Science & Information Technology