I'm a bit unsure about this one. I know NIST SP 800-61 r2 is the incident response guide, but I can't quite recall all the specific elements it covers. I'll have to think this through carefully.
I'm a bit confused by the options here. Some of them seem very specific, like the SAML token propagation. I'll need to review my notes on OSB security to make sure I select the right three.
This seems like a pretty straightforward question. I'd focus on options B and D - communicating the value achieved and targeting executive priorities are key when talking to the C-suite.
I believe A) Fraud achieved by the manipulation of the computer records is a cyber-crime because it involves manipulating digital data for fraudulent purposes.
Fernanda
4 months agoHan
4 months agoTamekia
4 months agoNathalie
4 months agoClorinda
4 months agoGaston
5 months agoXochitl
5 months agoGregoria
5 months agoDelbert
5 months agoAaron
5 months agoKimbery
5 months agoVirgina
5 months agoLilli
10 months agoNickolas
9 months agoSheldon
9 months agoMose
10 months agoLottie
10 months agoHerman
10 months agoMelina
8 months agoBenton
8 months agoShanice
8 months agoKenia
8 months agoJean
8 months agoAdelle
8 months agoMerlyn
8 months agoJanet
8 months agoBernardo
10 months agoRessie
10 months agoAlyce
10 months agoAdelina
9 months agoLinn
9 months agoZachary
11 months agoTimmy
11 months ago