Why should escalation requirements be considered as part of an incident response strategy?

A. Because all exploits take advantage of software flaws
B. Because some hackers are smarter than others
C. Because not all violations represent the same threat to an organization
D. Because some countermeasures are more expensive than others

Answer: C. Because not all violations represent the same threat to an organization

Computer Science & Information Technology

You might also like to view...

A web site address is also known as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can apply a background image to a form using the Insert Picture dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology