A company is reviewing the results of the Nikto scan, and they determined that several internal web servers (likely associated with internal web applications) have a number of vulnerabilities. They also noticed several servers that have returned click-jacking vulnerabilities. Which option should be used to remediate this issue?
What are three examples of incident response? (Choose three.)
What is the BEST process to identify the vendors that will ensure protection and compliance with security and privacy laws?
Which of the following is the FIRST step taken to maintain the chain of custody in a forensic investigation?