Exam Name: | EC-Council Certified CISO (CCISO) | ||
Exam Code: | 712-50 Dumps | ||
Vendor: | ECCouncil | Certification: | CCISO |
Questions: | 494 Q&A's | Shared By: | jadon |
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
The process of identifying and classifying assets is typically included in the