Concerning a risk management strategy, what should the executive level be responsible for communicating?
A new employee is starting work at your company. When should they be informed of the company’s security policy?
Which NIST Cybersecurity Framework function should be executed before any others?
Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external
stakeholders?
Refer to the exhibit.
Your organization’s security team has been working with various business units to understand their business requirements, risk tolerance, and resources used to create a Framework Profile.
Based on the Profile provided, what entries correspond to labels A, B, and C?
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.
Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.
Which actions should you take to stop data leakage and comply with requirements of the company security policy?