I'm a little confused on this one. I was thinking option A, a data forensics program, might be the best choice, but now I'm second-guessing myself. I'll have to review the material one more time before deciding.
I feel pretty good about this question. I'm going to go with C - a layered security program. That's the most comprehensive approach to reducing the risk of a breach.
Ah, this is a tricky one. I could see arguments for a few of the options, but I think the best answer is probably D - an incident response program. That's key for minimizing the impact of a breach.
Hmm, I'm not totally sure about this one. I'm leaning towards option B, a configuration management program, but I'm not 100% confident. I'll have to think it through a bit more.
This one seems pretty straightforward. I'm going to go with option C - a layered security program. That's the best way to reduce the likelihood of a breach.
Incident response? More like incident *prevention*, am I right? Let's not wait for the bad stuff to happen, let's just make sure it doesn't happen in the first place.
Carmen
2 months agoHenriette
2 months agoArlette
2 months agoCorinne
3 months agoAfton
3 months agoSalome
3 months agoOdette
3 months agoLarae
4 months agoMariann
4 months agoArlette
4 months agoLucina
4 months agoVon
4 months agoRima
5 months agoDusti
5 months agoJoni
9 months agoJacob
10 months agoArminda
8 months agoCammy
8 months agoMicah
8 months agoAdelle
10 months agoTerry
8 months agoJordan
9 months agoChara
9 months agoMargart
10 months agoJoni
10 months agoLucy
8 months agoMargurite
8 months agoBarbra
9 months agoIsadora
9 months agoTyra
9 months agoJesus
9 months agoFrance
9 months agoHyun
9 months agoAleta
10 months agoCathern
10 months agoHelga
10 months agoHuey
9 months agoLinsey
9 months agoErnie
9 months agoCherilyn
9 months agoFrankie
10 months agoArlene
11 months ago