After you have completed essential steps following a security breach and have notified the appropriate people, what should be the final step?
A) Copy the logs of all affected systems for use as evidence.
B) Perform an emergency audit to determine whatdamage has been done.
C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again.
D) Change all affected passwords and repair any damage that has been done.
C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again.
You might also like to view...
How can SaaS, PaaS, and IaaS help your company save money?
What will be an ideal response?
Describe the steps you should take if you need to end a hanging application and Task Manager is unable to end it.
What will be an ideal response?
_____ is a technology that employs a microchip with an antenna to broadcast its unique identifier and location to receivers.
Fill in the blank(s) with the appropriate word(s).
This level of management is involved with tactical planning and implementing the long-term goals within an organization.
A. supervisors B. top management C. stockholders D. middle management