- Preparation -> Detection -> Containment -> Post-Incident Analysis
- It's an incentive program for security researchers to submit security issues
- All of the above
- It defines the 20 security controls for the whole enterprise security
- Monitoring and Analysis of Audit Logs
- The malware detection capability
- The primary objective of the Tier 1 call center is to perform malware analysis
- Unauthorized use of a compromised host to mine cryptocurrency