A security analyst is investigating a potential breach. Upon gathering, documenting, and securing the evidence, which of the following actions is the NEXT step to minimize the business impact?
A) Launch an investigation to identify the attacking host
B) Initiate the incident response plan
C) Review lessons learned captured in the process
D) Remove malware and restore the system to normal operation
Correct Answer:
Verified
Q285: A computer emergency response team is called
Q286: An incident response manager has started to
Q287: An active/passive configuration has an impact on:
A)
Q288: An application was recently compromised after some
Q289: A recent internal audit is forcing a
Q291: A company is performing an analysis of
Q292: Two users must encrypt and transmit large
Q293: A new Chief Information Officer (CIO) has
Q294: A systems administrator found a suspicious file
Q295: A Chief Information Officer (CIO) recently saw
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents