Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
Drag and drop the technology on the left onto the data type the technology provides on the right.
Refer to the exhibit. An attacker scanned the server using Nmap. What did the attacker obtain from this scan?