An information security analyst discovered a virtual machine server was compromised by an attacker. Which of the following should be the FIRST step to confirm and respond to the incident?
A. Pause the virtual machine.
B. Shut down the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine.
Answer: C. Take a snapshot of the virtual machine.
Computer Science & Information Technology
You might also like to view...
Bullet points are organized in a hierarchy similar to a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form.
What will be an ideal response?
Computer Science & Information Technology