What is the third step of the incident response process?

  • Containment
  • Recovery
  • Lessons learned
  • Eradication

Your Score:
Threats, Attacks and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Risk Management
Cryptography and PKI
CompTIA Security+ SY0-501
  • Threats, Attacks and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
    • This question is filed here
  • Cryptography and PKI