1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
13

The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:

1) Preparation 2) Detection and analysis 3) Containment, eradication, and recovery; and 4) ____. Select one: a. incident report b. triage c. post-incident activity d. resolution
Computers and Technology
1 answer:
GuDViN [60]3 years ago
7 0

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

You might be interested in
When an employee is told that his job will be outsourced within a year, he knows that his job will become unnecessary
Anvisha [2.4K]
False!! Hope this helps
8 0
3 years ago
Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi
kolbaska11 [484]
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
4 0
3 years ago
Read 2 more answers
The design activity key question, "how will this system interact with other systems..." is part of which design activity?​
nika2105 [10]
Re their answer choices

3 0
4 years ago
Before you create a pivot table, it is important to __.
Reptile [31]

Before you create a pivot table, it is important to <em><u>Create a database</u></em>.

Option: A

<u>Procedure to create Pivot Table: </u>

1. Select the cells and table in the sheet containing the data you want to use.

2. Go to the Insert tab and click the PivotTable command.

3. In the dialog box ‘Create PivotTable’ will appear. Choose your settings, then click OK. In our example, we will use Sheet1 as our source data and insert the PivotTable on a new worksheet.

4. The Field List and blank PivotTable will appear on a new worksheet.

5. Once you create a PivotTable, you have to decide which fields to add. Each field has a simple column header from the source data. In the PivotTable Field List, check the box for each field you want to add.  

6. The selected fields will be added to one of the four areas below the Field List. In our example, the Salesman field has been added to the Rows area, while the Order Amount has been added to the Values area. Alternatively, you can click, hold, and drag a field to the desired area.

7. The PivotTable values will calculate and summarize the selected fields. In our example, the PivotTable shows the amount sold by each salesman.

8 0
3 years ago
Read 2 more answers
You are running a web server app in Ubuntu Server. Users complain that their browsers are loading webpages with errors. Where ar
tresset_1 [31]

Answer:

/var/log

Explanation:

The /var/log location identifies the location to view the log file.

Records of usage of a particular OS or software can be viewed in the log file. They usually provide a detailed view of the events of an application or system.

Log files usually provide a massive guide for troubleshooting a service, application or OS. Due to the possibility of a service or application to generate log files, these come in handy when a service malfunction, because it contains detailed information about the events of that service or application.

7 0
3 years ago
Other questions:
  • What are the coordinates of point B in the diagram? A. (3.25, -2.5) B. (4, -5) C. (1, 3) D. (2.5, 0)
    11·2 answers
  • What file format can excel save files as
    10·1 answer
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _____.
    10·1 answer
  • Identify the terms associated with the given statements below;
    6·1 answer
  • A common and extremely useful feature of most online dictionaries is
    12·1 answer
  • Malware is any malicious software installed on a computer or network without the owner’s knowledge.
    10·1 answer
  • Hot components or sharp edges of computer is an example of what hazard​
    14·1 answer
  • How can you make a search phrase more effective?
    11·1 answer
  • Firestick optimizing system storage and applications
    14·1 answer
  • r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions. Tru
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!