An information security analyst discovered a virtual machine server was compromised by an attacker. Which of the following should be the FIRST step to confirm and respond to the incident?

A. Pause the virtual machine.
B. Shut down the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine.


Answer: C. Take a snapshot of the virtual machine.

Computer Science & Information Technology

You might also like to view...

Maximum Tolerable Downtime (MTD) should be determined by:

a. The project manager b. The risk manager c. Senior management d. The threat modeling tool

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Dynamic HTML is a special programming language by itself. 2. Line breaks and indentations are required to form valid CSS style rules.

Computer Science & Information Technology

What does this code do? What is the result of the following code?

 string strPath1 = "oldfile.txt";
 string strPath2 = "newfile.txt";
 string strLine;

 StreamWriter objStreamWriter;
 objStreamWriter = new StreamWriter( strPath2 );

 StreamReader objStreamReader;
 objStreamReader = new StreamReader( strPath1 );

 while ( objStreamReader.Peek() > -1 )
 {
 strLine = objStreamReader.ReadLine();
 objStreamWriter.WriteLine( strLine );
 }

 objStreamWriter.Close();
 objStreamReader.Close();

Computer Science & Information Technology

When the function terminates, its memory space is ____.

A. allocated B. recycled C. left intact D. deallocated

Computer Science & Information Technology