What must be included in the CMDB?
What should an organization use to effectively mitigate against password sharing to prevent unauthorized access to systems?
You have been tasked with documenting mission critical procedures of an organization that need to be sustained through a significant disruption.What document would you develop?
What contains a predefined set of efforts that describes an organization's mission/business critical processes, and defines how they will be sustained during and after a significant disruption?
An Internet-connected file server compromised by a threat that leaked all data. The data was destroyed to cover all tracks. The file server has high availability capabilities to handle critical workloads. The operations team took only 15 minutes to restore workload routing to a different node.What part(s) of the CIA Triad was affected?
Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat.What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?