1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
3 years ago
5

An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the

organization has installed cryptocurrency mining software on the organization’s web servers. Given the organization’s stated priorities, which of the following would be the NEXT step?
a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged
Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
4 0

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

You might be interested in
An engineer plans to connect three switches (SW1, SW2, and SW3) in a lab. Before connecting the switches, he starts by configuri
g100num [7]

Answer:

c. All use SW3's database because SW3 has the highest revision number.

Explanation:

In this particular configuration, the three switches will definitely be connected to one another by the presence of some path with the specific trunks. As a result, the database with the most revision number will ultimately win. The process of the STP election does not have any influence on the selection of the VTP.

4 0
3 years ago
Which you could use an Excel chart to present your data?
Svetach [21]
Determining what percentage of customer 101 buys product A, and what percentage of the customer buys product B
6 0
3 years ago
The high-latitude climate is _____________ the equator.<br><br> closest to<br> farthest from
BARSIC [14]
I believe it’s farthest from
5 0
3 years ago
What is the purpose of the transport layer in managing the transportation of data in end-to-end communication? Explain how it sh
kobusy [5.1K]
The transport layer gives you the best route, security and safest path to the destination. The transportation of data takes place here.
4 0
3 years ago
Where's the space key again <br> Sorry I forgot <br> I'm so inbarest sorry <br> In my computer
Kipish [7]
The space key is the longest key on the bottom of the keyboard

8 0
3 years ago
Other questions:
  • Can someone text me cuss I'm bored my number is (225) 975 7120
    10·1 answer
  • Insurance can help you:
    10·1 answer
  • Which of the following is a valid SQL statement? a. c.customer#, order#, orderdate, shipdate FROM customers c NATURAL JOIN order
    13·1 answer
  • __________________ are evaluations of a network
    6·1 answer
  • What is the maximum transmission speed for bluetooth v3 and v4 devices?
    12·1 answer
  • What is the biggest difference between technical communication and the other kinds of writing you have done?
    13·1 answer
  • In java, a class that is defined without an explicit extends clause ____.
    15·2 answers
  • Assignment Guidelines
    12·1 answer
  • What report provides data on how specific sections of a website performed?
    6·1 answer
  • Explain the role of protocol and standard organization in facilities interoperability in nertwork communication ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!