What are the steps in damage control?
What will be an ideal response?
Report the incident to security or the police. Confront any suspects (if the situation allows). Neutralize the suspected perpetrator from harming others (if necessary). Secure physical security features. Quarantine electronic equipment. Contact the response team.
You might also like to view...
File compression makes files smaller to conserve disk space and make the files easier to transfer
Indicate whether the statement is true or false
Outbound traffic refers to data:
A) sent to your computer B) in e-mails sent to you C) in messages sent to you D) sent from your computer
A function returning a value must specify, in its header line, the data type of the value that will be returned.
Answer the following statement true (T) or false (F)
Which of the following BEST describes a common security concern for cloud computing?
A. Data may be accessed by third parties who have compromised the cloud platform B. Antivirus signatures are not compatible with virtualized environments C. Network connections are too slow D. CPU and memory resources may be consumed by other servers in the same cloud