Posted by: Pdfprep
Post Date: June 17, 2021
A company recently experienced a security breach. The security staff determined that the intrusion was due to an out-of-date proprietary software program running on a non-compliant server. The server was imaged and copied onto a hardened VM, with the previous connections re-established.
Which of the following is the NEXT step in the incident response process?
A . Recovery
B . Eradication
C . Lessons learned
D . Containment
E . Identification
Answer: C
Leave a Reply