Which of the following procedures should the security responder apply to the situation?
An organization has recently deployed an EDR solution across its laptops, desktops, and server infrastructure. The organization’s server infrastructure is deployed in an IaaS environment. A database within the non-production environment has been misconfigured with a routable IP and is communicating with a command and control server.
Which of the following procedures should the security responder apply to the situation? (Choose two.)
A . Contain the server.
B . Initiate a legal hold.
C . Perform a risk assessment.
D . Determine the data handling standard.
E . Disclose the breach to customers.
F . Perform an IOC sweep to determine the impact.
Answer: A,F
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments