In which step of the incident response methodology do you mitigate the attack

In which step of the incident response methodology do

This preview shows page 1 - 4 out of 5 pages.

QUESTION 5
Image of page 1
In which step of the incident response methodology do you mitigate the attack effects on the neighboring IT resources? IdentificationContainmentRemediationRecovery 10 points QUESTION 6If you are reacting to a malicious software attack, such as a virus and its spread, during which step in the incident response process are you attempting to minimize itsspreading? 10 points QUESTION 7In which section of the computer incident response policy you created in the lab did you define and incorporate the six-step incident response approach along with how the chain of custody must be maintained throughout any evidence collection process? 10 points QUESTION 8In which step of the incident response methodology do you establish contacts, define procedures, gather information, and get familiar with intrusion detection tools to save time during an attack? 10 points QUESTION 9In which section of the computer incident response policy you created in the lab did you define the security incident response team members and the authorization and authority granted to them during a crisis or securing incident situation? Purpose/Objectives
Image of page 2
ScopeStandardsProcedures 10 points
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 5 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture