In a standard incident response process, which of the following steps happens after investigation?

A. Identification
B. Containment
C. Eradication
D. Evidence gathering

C. Eradication; the removal of the attack, threat, and so on, which happens after investigation. It is followed up by recovery and then documentation and monitoring.

Computer Science & Information Technology

You might also like to view...

In a ________, whenever the data in the first table is modified, all the related occurrences of the data in the second table are also modified

A) cascading update B) linked change C) linked update D) cascading change

Computer Science & Information Technology

Function __________ looks for the first occurrence of a regular expression in a string.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology