What are the steps in damage control?

What will be an ideal response?


Report the incident to security or the police. Confront any suspects (if the situation allows). Neutralize the suspected perpetrator from harming others (if necessary). Secure physical security features. Quarantine electronic equipment. Contact the response team.

Computer Science & Information Technology

You might also like to view...

File compression makes files smaller to conserve disk space and make the files easier to transfer

Indicate whether the statement is true or false

Computer Science & Information Technology

Outbound traffic refers to data:

A) sent to your computer B) in e-mails sent to you C) in messages sent to you D) sent from your computer

Computer Science & Information Technology

A function returning a value must specify, in its header line, the data type of the value that will be returned.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following BEST describes a common security concern for cloud computing?

A. Data may be accessed by third parties who have compromised the cloud platform B. Antivirus signatures are not compatible with virtualized environments C. Network connections are too slow D. CPU and memory resources may be consumed by other servers in the same cloud

Computer Science & Information Technology