ExamGecko
Question list
Search
Search

Related questions











Question 154 - 200-201 discussion

Report
Export

An engineer discovered a breach, identified the threat's entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?

A.

Recover from the threat.

Answers
A.

Recover from the threat.

B.

Analyze the threat.

Answers
B.

Analyze the threat.

C.

Identify lessons learned from the threat.

Answers
C.

Identify lessons learned from the threat.

D.

Reduce the probability of similar threats.

Answers
D.

Reduce the probability of similar threats.

Suggested answer: A

Explanation:

After a breach has been discovered and the immediate threat has been addressed by identifying and removing the threat's access, the next step according to the NIST SP 800-61 Incident Handling Guide is to recover from the threat.This involves restoring systems to normal operation, confirming that the systems are functioning normally, and applying patches or other remediation measures to prevent similar breaches in the future1.

Understanding NIST SP 800-61: The Computer Security Incident Handling Guide

asked 07/10/2024
DATA 7 DATA7
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first