I'm a little confused on this one. I was thinking option A, a data forensics program, might be the best choice, but now I'm second-guessing myself. I'll have to review the material one more time before deciding.
I feel pretty good about this question. I'm going to go with C - a layered security program. That's the most comprehensive approach to reducing the risk of a breach.
Ah, this is a tricky one. I could see arguments for a few of the options, but I think the best answer is probably D - an incident response program. That's key for minimizing the impact of a breach.
Hmm, I'm not totally sure about this one. I'm leaning towards option B, a configuration management program, but I'm not 100% confident. I'll have to think it through a bit more.
This one seems pretty straightforward. I'm going to go with option C - a layered security program. That's the best way to reduce the likelihood of a breach.
Incident response? More like incident *prevention*, am I right? Let's not wait for the bad stuff to happen, let's just make sure it doesn't happen in the first place.
Carmen
4 months agoHenriette
4 months agoArlette
4 months agoCorinne
4 months agoAfton
4 months agoSalome
5 months agoOdette
5 months agoLarae
5 months agoMariann
5 months agoArlette
5 months agoLucina
6 months agoVon
6 months agoRima
6 months agoDusti
6 months agoJoni
11 months agoJacob
11 months agoArminda
9 months agoCammy
10 months agoMicah
10 months agoAdelle
11 months agoTerry
10 months agoJordan
10 months agoChara
11 months agoMargart
11 months agoJoni
11 months agoLucy
10 months agoMargurite
10 months agoBarbra
10 months agoIsadora
10 months agoTyra
10 months agoJesus
10 months agoFrance
10 months agoHyun
11 months agoAleta
12 months agoCathern
12 months agoHelga
12 months agoHuey
11 months agoLinsey
11 months agoErnie
11 months agoCherilyn
11 months agoFrankie
11 months agoArlene
1 year ago