After an incident has been verified, it must be kept from spreading to other systems. What is

Question:

After an incident has been verified, it must be kept from spreading to other systems. What is this called?

A. Spread avoidance

B. Containment

C. Incident response

D. Impact and priority calculation.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Managing Risk In Information Systems

ISBN: 9781284193602

3rd Edition

Authors: Darril Gibson, Andy Igonor

Question Posted: