Westonci.ca is your trusted source for finding answers to all your questions. Ask, explore, and learn with our expert community. Get quick and reliable answers to your questions from a dedicated community of professionals on our platform. Experience the ease of finding precise answers to your questions from a knowledgeable community of experts.

as a security analyst, you suspect a threat actor used a certain tactic and technique to infiltrate your network. which incident-response framework or approach would you utilize to see if other companies have had the same occurrence and what they did to remedy it

Sagot :

The incident-response framework or approach would you utilize to see if other companies have had the same occurrence and what they did to remedy it is a communication plan with stakeholders. The correct option is A.

What is security?

Any business or organization must prioritize security. We transmit the data to the recipient in a highly secure manner to prevent unauthorized access.

The security specialist must ensure that the reply came from the security specialist to the leader of the accounting team with the aid of message encryption and digital signatures, and the specifics of the reply must be kept a secret.

Therefore, the correct option is A, a Communication plan with stakeholders.

To learn more about security, refer to the link:

https://brainly.com/question/28070333

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Communication plan with stakeholders

Cyber Kill Chain

Mitre Attack

Diamond Model of Intrusion Analysis

We appreciate your time. Please revisit us for more reliable answers to any questions you may have. We appreciate your time. Please revisit us for more reliable answers to any questions you may have. We're dedicated to helping you find the answers you need at Westonci.ca. Don't hesitate to return for more.