Question: Based on your analysis using the tools in the Identification process, you think that data is being exfiltrated from the company to an outside, cloud
Based on your analysis using the tools in the Identification process, you think that data is being exfiltrated from the company to an outside, cloudbased server.
Choose the three items below that make the MOST sense in trying to contain this incident and limit the damage until you and your team can fully understand the problem and resolve it
Based on your analysis using the tools in the Identification process, you think that data is being exfiltrated from the company to an outside, cloudbased server.
Choose the three items below that make the MOST sense in trying to contain this incident and limit the damage until you and your team can fully understand the problem and resolve it
If a computer is on disconnect it from the network jack in the wall
Begin planning your retaliation
Call
Put up signs and text message managers instructing people to NOT turn on their computers
Call Google for help
If a computer is on turn the computer off
Physically disconnect the cable connecting your building to the ISP
Begin formatting hard drives of any PC that is suspected of being infected'
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
