Which steps should an engineer take at the recovery stage?

A threat actor used a phishing email to deliver a file with an embedded macro. The file was opened, and a remote code execution attack occurred in a company’s infrastructure.

Which steps should an engineer take at the recovery stage?
A . Determine the systems involved and deploy available patches
B . Analyze event logs and restrict network access
C . Review access lists and require users to increase password complexity
D . Identify the attack vector and update the IDS signature list

Answer: B

Latest 350-201 Dumps Valid Version with 139 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments