1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
13

The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:

1) Preparation 2) Detection and analysis 3) Containment, eradication, and recovery; and 4) ____. Select one: a. incident report b. triage c. post-incident activity d. resolution
Computers and Technology
1 answer:
GuDViN [60]3 years ago
7 0

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

You might be interested in
You’ve just installed a software update, rebooted, and now your system experiences random crashes. Which too in Windows 8.1 enab
Usimov [2.4K]

Answer:

Action Center

Explanation:

The Action Center is a feature in window 8.1 that monitors security and maintenance on your computer.It notifies you when there is an issue.Through this user can view alerts and updates about software support problem.

5 0
3 years ago
Who is the three president of somalia​
Snezhnost [94]

Answer:

Siad Barre

Explanation:

3 0
3 years ago
Read 2 more answers
How many feet do you have to stop away from a school bus
mr_godi [17]
You are required by law to stop twenty feet away from a school bus when driving.
7 0
3 years ago
What does UAS stand for
dezoksy [38]

Answer: Unmanned Aircraft Systems

Explanation:

8 0
3 years ago
Read 2 more answers
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
2 years ago
Other questions:
  • Is a software program that allows users to access the world wide web
    10·1 answer
  • A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser
    11·1 answer
  • Which statement compares the copy and cut commands?
    5·2 answers
  • Which type of object is used to organize and store data in Microsoft access 2013
    5·2 answers
  • How often should you typically monitor your checking account? Yearly Daily Every three months Monthly
    10·2 answers
  • In a network, a computer that performs specific services for other computers on the network is called a
    5·1 answer
  • How do you merge on excel?​
    5·1 answer
  • Tell me the most scariest website you know and i'll give you brainlest
    5·1 answer
  • python Which data type is the best choice to store the number of wins associated with each basketball team in the NBA
    12·2 answers
  • To find information on a network use a ____
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!