Find the best solutions to your questions at Westonci.ca, the premier Q&A platform with a community of knowledgeable experts. Connect with professionals ready to provide precise answers to your questions on our comprehensive Q&A platform. Connect with a community of professionals ready to help you find accurate solutions to your questions quickly and efficiently.

as a security analyst, you suspect a threat actor used a certain tactic and technique to infiltrate your network. which incident-response framework or approach would you utilize to see if other companies have had the same occurrence and what they did to remedy it

Sagot :

The incident-response framework or approach would you utilize to see if other companies have had the same occurrence and what they did to remedy it is a communication plan with stakeholders. The correct option is A.

What is security?

Any business or organization must prioritize security. We transmit the data to the recipient in a highly secure manner to prevent unauthorized access.

The security specialist must ensure that the reply came from the security specialist to the leader of the accounting team with the aid of message encryption and digital signatures, and the specifics of the reply must be kept a secret.

Therefore, the correct option is A, a Communication plan with stakeholders.

To learn more about security, refer to the link:

https://brainly.com/question/28070333

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Communication plan with stakeholders

Cyber Kill Chain

Mitre Attack

Diamond Model of Intrusion Analysis