What should been done to limit the damage caused by the ransomware attack
Which is the first step in the risk management process
Set of rules that everyone must comply with and usually carry monetary penalties for noncompliance
Which of the following is a type of risk that involves the unauthorized use or disclosure of confidential information such as passwords, financial data or personal information?
Restoring IT and communications back to full operation after a disruption.
Granting a user access to services or the system
Faking the sender address in a transmission to gain illegal entry into a secure system
In which cloud model does the cloud customer have less responsibility over the infrastructure
Who should participate in creation a business continuity plan
Which maintains that a user or entity should only have access to the spec data, resources and applications needed to complete a required task.