COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Associated issues of ‘Computer crime’ is since phase what until what phase?
A
Since phase 1
B
from phase 2 until phase 3 only
C
from phase 2 until phase 4
D
None of the above
Explanation: 

Detailed explanation-1: -The NIST incident response lifecycle breaks incident response down into four main phases: Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-Event Activity.

Detailed explanation-2: -Containment, Eradication, & Recovery. The purpose of the containment phase is to halt the effects of an incident before it can cause further damage.

There is 1 question to complete.