EMC Related Exams
DES-9131 Exam
Which NIST Cybersecurity Framework function should be executed before any others?
An Internet-connected file server compromised by a threat that leaked all datA. The data was destroyed to cover all tracks. The file server has high availability capabilities to handle critical workloads. The operations team took only 15 minutes to restore workload routing to a different node.
What part(s) of the CIA Triad was affected?
What is a consideration when performing data collection in Information Security Continuous Monitoring?