An incident has occurred. You restore backups onto mission/business critical assets. After restoration of the
backups your services are still inaccessible on numerous assets.
What could be the cause of the issue?
An Internet-connected file server compromised by a threat that leaked all dat
Your organization has tasked you with collecting information on all the data, personnel, devices, systems, and facilities that enable the organization to achieve its business purposes.
Which part of the NIST Cybersecurity Framework would you consult first?
In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old.
This has freed up 25 TB per logging server.
What must be updated once the truncation is verified?
The project manager of a data center has a budget of $1,500,000 to install critical infrastructure systems. The project will take 24 months to complete.
The project manager is working with the project management team, security experts, and stakeholders to
identify cyber risks. After reviewing the project plan, the CIO wants to know why so many risk identification meetings are requested.
What a valid reason for the repeated risk identification meetings?