After you have completed essential steps following a security breach and have notified the appropriate people, what should be the final step?
A) Copy the logs of all affected systems for use as evidence.
B) Perform an emergency audit to determine whatdamage has been done.
C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again.
D) Change all affected passwords and repair any damage that has been done.
C) Meet with IT staff to discuss what can be learned and how to prevent it from happening again.
Computer Science & Information Technology
You might also like to view...
When you click the Replace All button in the Replace dialog box, a message box is displayed indicating the number of replacements that were made
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following can achieve authentication?
A. Intrusion detection systems B. Log files C. Auditing D. Tokens
Computer Science & Information Technology