ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 227 - CS0-003 discussion

Report
Export

Two employees in the finance department installed a freeware application that contained embedded malware. The network is robustly segmented based on areas of responsibility. These computers had critical sensitive information stored locally that needs to be recovered. The department manager advised all department employees to turn off their computers until the security team could be contacted about the issue. Which of the following is the first step the incident response staff members should take when they arrive?

A.
Turn on all systems, scan for infection, and back up data to a USB storage device.
Answers
A.
Turn on all systems, scan for infection, and back up data to a USB storage device.
B.
Identify and remove the software installed on the impacted systems in the department.
Answers
B.
Identify and remove the software installed on the impacted systems in the department.
C.
Explain that malware cannot truly be removed and then reimage the devices.
Answers
C.
Explain that malware cannot truly be removed and then reimage the devices.
D.
Log on to the impacted systems with an administrator account that has privileges to perform backups.
Answers
D.
Log on to the impacted systems with an administrator account that has privileges to perform backups.
E.
Segment the entire department from the network and review each computer offline.
Answers
E.
Segment the entire department from the network and review each computer offline.
Suggested answer: E

Explanation:

Segmenting the entire department from the network and reviewing each computer offline is the first step the incident response staff members should take when they arrive. This step can help contain the malware infection and prevent it from spreading to other systems or networks. Reviewing each computer offline can help identify the source and scope of the infection, and determine the best course of action for recovery12. Turning on all systems, scanning for infection, and backing up data to a USB storage device is a risky step, as it can activate the malware and cause further damage or data loss. It can also compromise the USB storage device and any other system that connects to it. Identifying and removing the software installed on the impacted systems in the department is a possible step, but it should be done after segmenting the department from the network and reviewing each computer offline. Explaining that malware cannot truly be removed and then reimaging the devices is a drastic step, as it can result in data loss and downtime. It should be done only as a last resort, and after backing up the data and verifying its integrity. Logging on to the impacted systems with an administrator account that has privileges to perform backups is a dangerous step, as it can expose the administrator credentials and privileges to the malware, and allow it to escalate its access and capabilities34.

Reference: Incident Response: Processes, Best Practices & Tools - Atlassian, Incident Response Best Practices | SANS Institute, Malware Removal: How to Remove Malware from Your Device, How to Remove Malware From Your PC | PCMag

asked 02/10/2024
Keenan Bragg
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first