An information security analyst discovered a virtual machine server was compromised by an attacker. Which of the following should be the FIRST step to confirm and respond to the incident?

A. Pause the virtual machine.
B. Shut down the virtual machine.
C. Take a snapshot of the virtual machine.
D. Remove the NIC from the virtual machine.

Answer: C. Take a snapshot of the virtual machine.

Computer Science & Information Technology

You might also like to view...

Bullet points are organized in a hierarchy similar to a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the minimal normal form that a relation must satisfy? Provide a definition for this normal form.

What will be an ideal response?

Computer Science & Information Technology