Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions: Shut down all network shares. Run an email search identifying all employees who received the malicious message. Reimage all devices belonging to users who opened the attachment. Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?
A) Eradication
B) Containment
C) Recovery
D) Lessons learned
Correct Answer:
Verified
Q914: The security administrator receives an email on
Q915: During an incident, a company's CIRT determines
Q916: A security analyst is hardening a server
Q917: A security analyst is reviewing the following
Q918: A company is implementing MFA for all
Q920: An organization just experienced a major cyberattack
Q921: An external contractor, who has not been
Q922: A security administrator wants to implement a
Q923: Which of the following could help detect
Q924: A web developer improves client access to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents