A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company's infrastructure. Which steps should an engineer take at the recovery stage?
A) Determine the systems involved and deploy available patches
B) Analyze event logs and restrict network access
C) Review access lists and require users to increase password complexity
D) Identify the attack vector and update the IDS signature list
Correct Answer:
Verified
Q1: An organization is using a PKI management
Q2: Which command does an engineer use to
Q3: An engineer received an alert of a
Q4: Refer to the exhibit. A threat actor
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents