Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?
A. Incident report
B. Application scan results
C. Request for information
D. Risk register
Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?
A. Incident report
B. Application scan results
C. Request for information
D. Risk register