What is the next step?

The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive. The team collects and documents all the necessary evidence from the computing resource.

What is the next step?
A . Conduct a risk assessment of systems and applications
B . Isolate the infected host from the rest of the subnet
C . Install malware prevention software on the host
D . Analyze network traffic on the host’s subnet

Answer: B

Latest 350-201 Dumps Valid Version with 139 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments