1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
14

An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the

organization has installed crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?
a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged
Computers and Technology
1 answer:
djyliett [7]3 years ago
5 0

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

You might be interested in
On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.
Alla [95]
Answer : The center lane is designated for left turns

Explanation: 
This lane is used so that drivers would pull into in order to turn left when a clear merge is available. Its main purpose is not to cause traffic jam while waiting for the chance to turn left. It is illegal to use this lane for any other purposes
5 0
3 years ago
What is the best website to get a iphone
sveticcg [70]
Generally I'd recommend not buying one online, tends to be cheaper from a shop - and better used, although their are some risks with 2nd hand devices, I think the big price cut it worth it. 

If you did want to buy online, maybe Amazon or Ebay?
7 0
3 years ago
Read 2 more answers
The commands available from a menu do not change. True or false
jeka94

i believe this will be false


3 0
3 years ago
Read 2 more answers
SSDS are ______ than magnetic hard disks
Deffense [45]
The answer is 1 faster
6 0
2 years ago
I didn't go to school today and i want to know if my teacher would contact my parents.
AURORKA [14]

the school will call your parents

6 0
3 years ago
Other questions:
  • Unlike a virtual image, a real image
    7·1 answer
  • In a switch statement, if a break statement is missing, _______________. Select one: a. the default case is automatically execut
    15·1 answer
  • 5. Drawing Conclusions If you were a person in
    10·1 answer
  • "When you can control devices and appliances by apps installed on your smartphone or tablet, you are said to have"
    6·1 answer
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    5·1 answer
  • Lenders always accept applications for credit
    10·1 answer
  • Given a collection of n nuts and a collection of n bolts, arranged in an increasing order of size, give an O(n) time algorithm t
    5·1 answer
  • How will understanding IT help me achieve my goals in life?
    14·1 answer
  • Who is the best nfl team in your mind
    14·2 answers
  • Your company has a team of remote workers that need to use Windows-based software to develop company applications, but your team
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!