DES-9131 無料問題集「EMC Specialist - Infrastructure Security」
Refer to the exhibit.

Your organization's security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.
Based on the Profile provided, what entries correspond to labels A, B, and C?


Your organization's security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.
Based on the Profile provided, what entries correspond to labels A, B, and C?

正解:C
解答を投票する
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.
Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.
Which actions should you take to stop data leakage and comply with requirements of the company security policy?
Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.
Which actions should you take to stop data leakage and comply with requirements of the company security policy?
正解:D
解答を投票する