Structured way to align IT with business goals while managing risks and meeting all industry and government regulations
Answer : A
A structured approach used to oversee and manage risk for an enterprise
Answer : C
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called______
Answer : B
An employee unintentionally shares confidential information with an unauthorized party. What term best describes this situation?
Answer : D
Incident management is also known as
Answer : D
What is the main purpose of creating baseline in ensuring system integrity
Answer : A
Which penetration testing technique requires the team to do the MOST work and effort?
Answer : D