Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A security technician receives a copy of a report that was originally sent to the board of directors by the Chief Information Security Officer (CISO)

image text in transcribed

A security technician receives a copy of a report that was originally sent to the board of directors by the Chief Information Security Officer (CISO) The report outines the following KP/KRI data for the last 12 months Detected Infected AV Fleet AV Signature Phishing Coverage Updated Infected Threat nth Security Incidents Attempts Systems andscape Number of Open January February March 100% 100% 100% Low 17 12 Low Medium Medium 10 95% 95% 95% August 10 October Low 95% 100% Which of the following BEST describes what could be interpreted from the above data? 1. AV coverage across the fleet improved 2. There is no correlation between infected systems and AV coverage 3. There is no correlation between detected phishing attempts and infected systems 4. A correlation between threat landscape rating and infected systems appears to exist 5. Effectiveness and performance of the security team appears to be degrading 1. AV signature coverage has remained consistently high 2. AV coverage across the fleet improved 3. A correlation between phishing attempts and infected systems appears to exist 4 There is a correlation between the threat landscape rating and the security team's performance 5 There is no correlation between detected phishing attempts and infected systems 1 There is no correlation between infected systems and AV coverage 2. AV coverage across the fleet improved 3. A correlation between phishing attempts and infected systems appears to exist 4 There is no correlation between the threat landscape rating and the security team's performance 5. There is a correlation between detected phishing attempts and infected systems o C 1AV coverage across the fleet declined 2. There is no correlation between infected systems and AV coverage D 3. A correlation between phishing attempts and infected systems appears to exist 4 There is no correlation between the threat landscape rating and the security team's performance 5 Effectiveness and performance of the security team appears to be degrading

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Concepts of Database Management

Authors: Philip J. Pratt, Joseph J. Adamski

7th edition

978-1111825911, 1111825912, 978-1133684374, 1133684378, 978-111182591

Students also viewed these Databases questions

Question

5. To determine the financial benefits and costs of the program.

Answered: 1 week ago