Which problem management activity should be prioritized?
Which security practice should they use?
Which two actions should the company have taken prior to the disaster to safeguard their data? (Choose two.)
What should the employee do to confirm the authenticity of the request?
What should the organization do next?