1. The cyber incident-handling process includes...
Notification, Response, Documentation, Recovery and Follow-up
Discovery, Disclosure, Investigation, Arrest
Identification, Active Defense, Restoration, Hack Back
2. A private company that is victim of a significant cyber attack has the legal right to 'hack back' the perpetrator.
True
False
3. A data breach must always be disclosed as soon as it is discovered in order to protect customers and end users, regardless of whether or not there is a requirement to do so.
True
False