I'm a bit unsure about this one. I know NIST SP 800-61 r2 is the incident response guide, but I can't quite recall all the specific elements it covers. I'll have to think this through carefully.
I'm a bit confused by the options here. Some of them seem very specific, like the SAML token propagation. I'll need to review my notes on OSB security to make sure I select the right three.
This seems like a pretty straightforward question. I'd focus on options B and D - communicating the value achieved and targeting executive priorities are key when talking to the C-suite.
I believe A) Fraud achieved by the manipulation of the computer records is a cyber-crime because it involves manipulating digital data for fraudulent purposes.
Fernanda
6 months agoHan
6 months agoTamekia
7 months agoNathalie
7 months agoClorinda
7 months agoGaston
7 months agoXochitl
7 months agoGregoria
7 months agoDelbert
7 months agoAaron
7 months agoKimbery
7 months agoVirgina
8 months agoLilli
1 year agoNickolas
11 months agoSheldon
12 months agoMose
1 year agoLottie
1 year agoHerman
1 year agoMelina
11 months agoBenton
11 months agoShanice
11 months agoKenia
11 months agoJean
11 months agoAdelle
11 months agoMerlyn
11 months agoJanet
11 months agoBernardo
1 year agoRessie
1 year agoAlyce
1 year agoAdelina
12 months agoLinn
12 months agoZachary
1 year agoTimmy
1 year ago