The documented set of procedures to detect, respond to, and limit the consequences of cyberattacks is called:
A portion of the network exposed to the outside world with additional controls is called:
Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?
A collection of actions that must be followed to complete a task or process in accordance with a set of rules is known as:
What kind of control is it when we add a backup firewall that takes over if the main one stops working?
Which is the most efficient and effective way to test a business continuity plan?
A hacker intercepts network traffic to steal login credentials. Which OSI layer is being attacked?