List of questions
Related questions
Question 219 - CISM discussion
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
A.
Install the OS, patches, and application from the original source.
B.
Restore the OS, patches, and application from a backup.
C.
Restore the application and data from a forensic copy.
D.
Remove all signs of the intrusion from the OS and application.
Your answer:
0 comments
Sorted by
Leave a comment first