Which of the following actions should lake place immediately after a security breach is reported to an information security manager?

Posted by: Pdfprep Category: CISM Tags: , ,

Which of the following actions should lake place immediately after a security breach is reported to an information security manager?
A . Confirm the incident
B . Determine impact
C . Notify affected stakeholders
D . Isolate the incident

Answer: A

Explanation:

Before performing analysis of impact, resolution, notification or isolation of an incident, ii must be validated as a real security incident.

Leave a Reply

Your email address will not be published.