If the recovery time objective (RTO) increases:
Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
Which of the following attacks is BEST detected by an intrusion detection system (IDS)?
Which of the following activities should the business continuity manager perform FIRST after the replacement of hardware at the primary information processing facility?
Which of the following penetration tests would MOST effectively evaluate incident handling and response capabilities of an organization?