In the post-attack workflow of CyberSense, which steps are crucial?

In the post-attack workflow of CyberSense, which steps are crucial?
A . Reviewing workflow alerts for anomaly detection
B . Performing a system reboot immediately
C . Restoring from the most recent clean backup
D . Sending an email blast to all customers

Answer: AC

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments