Comment on page
What is the cyclical process that Defensive Cyber Operators use to defend their networks?
- 1.Detect, Prevent, Respond
- 2.Harden, Find, Kick out
- 3.Prevent, Detect, Respond
- 4.Observe, Orient, Decide, Act
Which is not a control we use in Information Assurance?
What does the "A" in the "CIA Triad" stand for?
In order for Charlie to access the ACME Corporations web server, he must enter his username and password in order to ________ himself?