List of questions
Related questions
Question 394 - SY0-601 discussion
A security analyst is currently addressing an active cyber incident. The analyst has been able to identify affected devices that are running a malicious application with a unique hash. Which of the following is the next step according to the incident response process?
A.
Recovery
B.
Lessons learned
C.
Containment
D.
Preparation
Your answer:
0 comments
Sorted by
Leave a comment first