Searching for systems infected with malware is considered to be which of the following phases of incident response?
A. Containment
B. Preparation
C. Mitigation
D. Identification
Answer: D. Identification
Computer Science & Information Technology
You might also like to view...
A Windows 8 control’s position should be specified based on its position relative to the layout container in which it’s included and the other controls in the same container. All controls have three properties for doing this—HorizontalAlignment, VerticalAlignment and ________ (which specifies how much space to put around a control’s edges).
a) Padding b) Fill c) Border d) Margin
Computer Science & Information Technology
Data move between the processor and memory __________.
a. one bit at a time b. one byte or one word at a time c. in variable length chunks d. any or all of the above
Computer Science & Information Technology