ECCouncil Exam Questions

Which of the following procedures is designed to enable security personnel to identify, mitigate&#82

Which of the following procedures is designed to enable security personnel to identify, mitigate,
and recover from malicious computer incidents, such as unauthorized access to a system or data,
denial-of-service attacks, or unauthorized changes to system hardware, software, or data?

A.
Cyber Incident Response Plan

B.
Crisis Communication Plan

C.
Occupant Emergency Plan

D.
Disaster Recovery Plan

Explanation: