In a standard incident response process, which of the following steps happens after investigation?
A. Identification
B. Containment
C. Eradication
D. Evidence gathering
C. Eradication; the removal of the attack, threat, and so on, which happens after investigation. It is followed up by recovery and then documentation and monitoring.
You might also like to view...
In order to maintain ____, it is important to obtain the appropriate authorization from the right manager.
A. chain of process B. chain of custody C. chain of direction D. chain of command
Office Online includes all of the following apps online EXCEPT:
A) OneNote Online B) Word Online C) Access Online D) Excel Online
What are the two types of networking devices defined by power over Ethernet? (Select all that apply.)
A) Powered sinking equipment B) Powered end users C) Powered sourcing equipment D) Powered device
Which security features are available on Windows 10 Home? Select all that apply.
a. Local Group Policy b. NTFS permissions c. Active Directory d. Internet Options