Question: Based on your analysis using the tools in the Identification process, you think that data is being exfiltrated from the company to an outside, cloud

Based on your analysis using the tools in the Identification process, you think that data is being exfiltrated from the company to an outside, cloud-based server.
Choose the three items below that make the MOST sense in trying to contain this incident and limit the damage until you and your team can fully understand the problem and resolve it.
Based on your analysis using the tools in the Identification process, you think that data is being exfiltrated from the company to an outside, cloud-based server.
Choose the three items below that make the MOST sense in trying to contain this incident and limit the damage until you and your team can fully understand the problem and resolve it.
If a computer is on, disconnect it from the network jack in the wall
Begin planning your retaliation
Call 911
Put up signs and text message managers instructing people to NOT turn on their computers
Call Google for help
If a computer is on, turn the computer off
Physically disconnect the cable connecting your building to the ISP
Begin formatting hard drives of any PC that is suspected of being infected'

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!