When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? 2. When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated? 3. What is the SANS Institute’s six-step incident handling process? 4. What is the risk of starting to contain an incident prior to completing the identification process? 5. Why is it a good idea to have a security policy that defines the incident response process in your organization? 6. The post-mortem, lessons learned step is the last in the incident response process. Why is this the most important step in the process
When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? 2. When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated? 3. What is the SANS Institute’s six-step incident handling process? 4. What is the risk of starting to contain an incident prior to completing the identification process? 5. Why is it a good idea to have a security policy that defines the incident response process in your organization? 6. The post-mortem, lessons learned step is the last in the incident response process. Why is this the most important step in the process
Trending now
This is a popular solution!
Step by step
Solved in 3 steps