Which of the following should be verified during incident response activities to determine the possible impact of the incident?
A laptop is recovered a few days after it was stolen.
Which of the following should be verified during incident response activities to determine the possible impact of the incident?
A . Full disk encryption status
B . TPM PCR values
C . File system integrity
D . Presence of UEFI vulnerabilities
Answer: D
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments