Which step in the incident response process researches an attacking host through logs in a SIEM?
Which step in the incident response process researches an attacking host through logs in a SIEM?
A . detection and analysis
B . preparation
C . eradication
D . containment
Answer: A
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments