A security professional is analyzing the results of a network utilization report. The report includes the following information:
Which of the following servers needs further investigation?
An organization has recently recovered from an incident where a managed switch had been accessed and reconfigured without authorization by an insider. The incident response team is working on developing a lessons learned report with recommendations. Which of the following recommendations will BEST prevent the same attack from occurring in the future?
A cybersecurity analyst is completing an organization’s vulnerability report and wants it to reflect assets accurately. Which of the following items should be in the report?
Which of the following BEST describes the offensive participants in a tabletop exercise?