1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
14

An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the

organization has installed crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?
a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged
Computers and Technology
1 answer:
djyliett [7]3 years ago
5 0

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

You might be interested in
Dustin is editing a SmartArt graphic. He wants all three shapes to be different colors.
lilavasa [31]

Answer:

click on Design tab → select associated shape → adjust color

Explanation:

I think it is that but i'm not positive. I will know in a little bit since I am taking the test right now.

6 0
3 years ago
You are trying to apply the same style to several different elements in a block, with line breaks before and after. Which tag sh
alina1380 [7]

Answer:

<div>

Explanation:

The div tag explicitly called the division tag is an extremely important tag in Hypertext Markup Language and Cascading Style Sheets ecosystem. Like most of the other tags used during writing and styling web documents, the div tags plays an important role as it serves as a container which is capable of holding several HTML elements such as the head, body , paragraph tags and so on. All elements within the div tags can be easily styled using the same CSS style specification without having to take the more singular and tedious approach. They also aid fast manipulation using compatible languages. Hence, using the cajas attribute, several elements within a div can be styled at the same time. Also note that , line breaks are automatically placed before and after a tag.

Hence, the div tag is the most appropriate answer.

8 0
3 years ago
Match the different sources of payments to their descriptions. an electronic device that aids consumers to make online payments
LekaFEV [45]

<u>Automatic Draft-</u> A convenient payment method where funds are automatically debited from your account.

<u>Cash-</u> The physical form of currency.

<u>Credit Card-</u> Allows you to make a purchase and pay for it later.

<u>Digital Wallet-</u> An electronic device that aids consumers to make online payments through various websites.

For anyone still looking, hope this helps.

6 0
3 years ago
Can I have some help?
Ad libitum [116K]
I believe its A as the image provided says plain message
6 0
2 years ago
What are the names of each devices pleaseee​
nignag [31]

Answer:

the answer is computer, phone, laptop

Explanation: that is all ik

3 0
3 years ago
Read 2 more answers
Other questions:
  • Evidence that Social media hasn’t improved human communication.
    12·1 answer
  • What is the unique impact him professionals have on coded data?
    11·1 answer
  • The MIQ inventory measures how much you value status. Which two measures are measures of status?
    11·1 answer
  • Which of the following are examples of software? Check all of the boxes that apply.
    12·2 answers
  • A tablet computer transmits a file over a wi-fi link to an access point.
    13·1 answer
  • “identify the skill in the following scenario” :
    6·2 answers
  • What is the best data structure to solve the following problem? a) A list needs to be built dynamically. b) Data must be easy to
    11·1 answer
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • The advancement in speed of transportation is attributed to invention of this device
    8·1 answer
  • A(n) _____ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally depende
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!