Solved

Match the Cybersecurity Threat to the Following Control Activity

Question 51

Multiple Choice

Match the cybersecurity threat to the following control activity:
-Review and update the baseline configuration of the information system as an integral part of information system component installations and upgrades.


A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions