From course:
(Practice similar questions for free)
ICE CONSULTING PRODUCTS & SERVICES
» Start this Course(Practice similar questions for free)
Question:
4 STEPS PROVIDED
Author: James WilliamsAnswer:
MONITOR - Real time monitoring of critical apps and services in a single dashboard ANALYZE - Centralized Log Collector to collect and store logs from services and devices for analysis. Risk management process that reduces chances of security breaches. RESPOND - Respond immediately to cyber attacks to avoid security breach ESTABLISH - Incident Response Plan (IRP)
0 / 5 Â (0 ratings)
1 answer(s) in total