According to NIST what option(s) should be contained in issue tracking system? (Choose all that apply.)
What is a common artifact used to uniquely identify a detected file?
Which type of intrusion event is an attacker retrieving the robots.txt file from a target site?
Which category do attributes belong to within the Veris schema?
Which purpose of data mapping is true?
What is the process of remediating the network and systems and/or reconstructing the attack so that the responsible threat actor can be revealed?