According to Payment Card Industry Data Security Standard (PCI DSS) compliance requirements, an organization must retain logs for what length of time?
Senior management has stated that antivirus software must be installed on all employee workstations. Which of the following does this statement BEST describe?
A government organization responsible for critical infrastructure is being attacked and files on the server been deleted. Which of the following are the most immediate communications that should be made regarding the incident? (Choose two.)
A company that maintains a public city infrastructure was breached and information about future city projects was leaked. After the post-incident phase of the process has been completed, which of the following would be PRIMARY focus of the incident response team?
A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:- Running antivirus scans on the affected user machines- Checking department membership of affected users- Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts- Checking network monitoring tools for anomalous activitiesWhich of the following phases of the incident response process match the actions taken?
Which of the following are well-known methods that are used to protect evidence during the forensics process? (Choose three.)