What is the next step?
The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive. The team collects and documents all the necessary evidence from the computing resource.
What is the next step?
A . Conduct a risk assessment of systems and applications
B . Isolate the infected host from the rest of the subnet
C . Install malware prevention software on the host
D . Analyze network traffic on the host’s subnet
Answer: B
Latest 350-201 Dumps Valid Version with 139 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments