In a standard incident response process, which of the following steps happens after investigation?
A. Identification
B. Containment
C. Eradication
D. Evidence gathering
C. Eradication; the removal of the attack, threat, and so on, which happens after investigation. It is followed up by recovery and then documentation and monitoring.
Computer Science & Information Technology
You might also like to view...
In a ________, whenever the data in the first table is modified, all the related occurrences of the data in the second table are also modified
A) cascading update B) linked change C) linked update D) cascading change
Computer Science & Information Technology
Function __________ looks for the first occurrence of a regular expression in a string.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology