A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?
In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old.
This has freed up 25 TB per logging server.
What must be updated once the truncation is verified?
What database is used to record and manage assets?
The CSF recommends that the Communication Plan for an IRP include audience, method of communication, frequency, and what other element?
What are the five functions of the NIST Framework Core?
What common process conducted by organizations when protecting digital assets is outside the scope of the NIST Cybersecurity Framework?
What contains a predefined set of efforts that describes an organization’s mission/business critical processes, and defines how they will be sustained during and after a significant disruption?
What are the four tiers of integration within the NIST Cybersecurity Framework?