Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial- of-service attacks, or unauthorized changes to system hardware, software, or data?
- Cyber Incident Response Plan
- Crisis Communication Plan
- Occupant Emergency Plan
- Disaster Recovery Plan
Show Answer Next Question