SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

ICE CONSULTING PRODUCTS & SERVICES

» Start this Course
(Practice similar questions for free)
Question:

4 STEPS PROVIDED

Author: James Williams



Answer:

MONITOR - Real time monitoring of critical apps and services in a single dashboard ANALYZE - Centralized Log Collector to collect and store logs from services and devices for analysis. Risk management process that reduces chances of security breaches. RESPOND - Respond immediately to cyber attacks to avoid security breach ESTABLISH - Incident Response Plan (IRP)


0 / 5  (0 ratings)

1 answer(s) in total