During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?
A penetration-testing firm is working with a local community bank to create a proposal that best fits the needs of the bank. The bank's information security manager would like the penetration test to resemble a real attack scenario, but it cannot afford the hours required by the penetration-testing firm. Which of the following would best address the bank's desired scenario and budget?
Which of the following security program audits includes a comprehensive evaluation of the security controls in place at an organization over a six- to 12-month time period?
Which of the following enables the use of an input field to run commands that can view or manipulate data?