The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler.
Which of the following is occurring?

A.
Unannounced audit response
B.
Incident response process
C.
Business continuity planning
D.
Unified threat management
E.
Disaster recovery process
Explanation:
The Incident response policy outlines the processes that should be followed when an incident
occurs. Thus when a CSO is contacted by a first responder and then assign a handler for the
incident it is clearly the incident response process that is put in practice.
B
0
0