A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:
Activities necessary to restore IT and communications services are known as:
A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?
How does IPSec protect against replay attacks?
Which of the following is a characteristic of cloud computing?
An unknown person obtains unauthorized access to the company file system. This is an example of:
Which plan provides immediate response procedures and management guidance?
An integrated platform and graphical tool for security testing of web applications is:
Configuration settings or parameters stored as data and managed through a GUI are examples of:
An approach using software-based controllers and APIs to direct network traffic: