1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
14

An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the

organization has installed crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?
a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged
Computers and Technology
1 answer:
djyliett [7]3 years ago
5 0

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

You might be interested in
Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
Rina8888 [55]

The answer is False.  

According to research, most of what many human beings do on a daily basis is to communicate on nonverbal cues and behaviors. They include facial expressions, postures, eye gaze, tone, and voice. From the little things we do everyday like handshakes to our hairstyles, nonverbal cues reveal who we are and how we relate with others. They communicate something without the use of written or oral language.  

Text messaging is not part of any nonverbal communications. In fact, most people will argue that text messaging is hugely affecting nonverbal communications. For example, if I text you and lie to you, you will not be able to read my body position. You may believe what I am saying is true, but you cannot read it.


8 0
3 years ago
Read 2 more answers
What type of engineering drawing use symbols to represent components drawings
seropon [69]

I would say Electrical engineer but I do not know for certain

5 0
3 years ago
Clara works behind a computer all day. She gets a lot of headaches, and her eyes have been hurting her lately. Her doctor diagno
Vinil7 [7]

Answer:

Clara should use computer lenses and artifical tears.

The computer lenses help block blue light from entering your eyes which would help with the headaches and help you focus on something further away. The artificial tears help lubricate dry eyes which prevents or in Clara's case, reduces/relieves eye strain.

8 0
2 years ago
Will a company ever finish its social media marketing strategy?
aleksley [76]
No.

This is because a social media company must always continue to adapt to new trends and marketing techniques in order to remain relevant to the community.

Hope this helps!
6 0
4 years ago
Tricia listed her assets and liabilities. Credit Card Bill Car Loan Bonds Piano Bank Account Bicycle Which are Tricia’s liabilit
DIA [1.3K]
<span>Her liabilities are her credit card bill and her car loan. These are things that she owes and has to pay off, so they are liabilities due to the fact that she owes for these items. Her bonds, piano, bank account, and bicycle are counted as assets.</span>
7 0
3 years ago
Read 2 more answers
Other questions:
  • In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the enti
    9·1 answer
  • To change the tab order in which fields are encountered on a form, click the tab order button on the ____ tab.
    15·1 answer
  • Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
    7·2 answers
  • 1. Which of the following is a drone? (1 point)
    10·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • Write a declaration for a class named City, which has the members cityName, a string, and position, a Location structure (declar
    10·1 answer
  • Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?
    5·2 answers
  • As a basic user of SAP Business One, which feature of the application do you like most? Elaborate on your answer.
    15·1 answer
  • Betty was sitting at a coffee shop reading her favorite book. She heard an explosion nearby. In a few, she could hear ambulance
    7·2 answers
  • Explain the role of computers in accounting
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!