During the recovery process, RTO and RPO should be the main parameters of your disaster
recovery plan. What does RPO refer to?
Which of the following indicators are discovered through an attacker's intent, their end goal or purpose, and a series of actions that they must take before being able to successfully launch an attack?
Which of the following network monitoring techniques requires extra monitoring software or hardware?
Riya bought some clothes and a watch from an online shopping site a few days back. Since then,
whenever she accesses any other application (games, browser, etc.) on her mobile, she is spammed with
advertisements for clothes and watches similar to the ones she bought. What can be the underlying
reason for Riya’s situation?