An organization has implemented a policy to detect and remove malicious software from its
network. Which of the following actions is focused on correcting rather than preventing attack?
Question No 2
Beta corporation is doing a core evaluation of its centralized logging capabilities. The security staff
suspects that the central server has several log files over the past few weeks that have had their
contents changed. Given this concern, and the need to keep archived logs for log correction
applications, what is the most appropriate next steps?
Question No 3
Which projects enumerates or maps security issues to CVE?
Question No 4
Which of the following archiving methods would maximize log integrity?
Question No 5
Which of the following is a responsibility of a change management board?