Question 46
How often should an environment be monitored for cyber threats, risks, and exposures?
Question 47
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
Question 48
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Question 49
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
Question 50
When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?