After a server has been attacked, which of the following is the BEST course of action?
A . Review vulnerability assessment
B . Conduct a security audit
C . Initiate modem response
D . Isolate the system.
Answer: C
Latest CISM Dumps Valid Version with 1327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund