After you have completed essential steps following a security breach and have notified the appropriate people, what should be the final step?

A) Copy the logs of all affected systems for use as evidence.
B) Perform an emergency audit to determine whatdamage has been done.
C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again.
D) Change all affected passwords and repair any damage that has been done.

C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again.

Computer Science & Information Technology

You might also like to view...

When you click the Replace All button in the Replace dialog box, a message box is displayed indicating the number of replacements that were made

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following can achieve authentication?

A. Intrusion detection systems B. Log files C. Auditing D. Tokens

Computer Science & Information Technology