1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
4 years ago
15

After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to

the breach. Which of the following steps in the incident response process has the administrator just completed?
A. Containment
B. Eradication
C. Recovery
D. Identification
Computers and Technology
1 answer:
patriot [66]4 years ago
5 0

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
You might be interested in
The process of making raw materials into a finished product is known as
Olin [163]
1.) Business Engineering or Manufacturing :)
<span />
6 0
3 years ago
Read 2 more answers
The component that allows you to make a paper-based copy of a body of text is the _____.
ANTONII [103]
The correct answer is: Scanner

The scanner is a piece of technology which unlike the printer is an input device which basically scans the top-view of any flat surface (usually paper but is definitely not limited to it) introduced in its effective range using light. The data scanned is then transfered to the Central Processing Unit for futher processing. The processed image can then be outputted and seen on the monitor's display. Once available for printing, the Central Processing Unit will just send the processed image into the printer ad voila, your scanned image is now printed in a piece of paper!

Today, scanners come with printers as a bundle. It is a perfect combination since the printer will just print the image anyway.
5 0
3 years ago
It is considered good practice to save a presentation before printing it. true false
Ilya [14]
It is true because it is really a good practise to save a presentation before printing it

5 0
3 years ago
Which of the following is a type of monitor port?
Soloha48 [4]
B. all of those.

just to clarify,
HDMI is the port for monitor and sound.

VGA is for video/monitor port
and display port.... I don't know, but it's a type of monitor port.
7 0
3 years ago
Good business ethics is a good marketing strategy. Discuss
Arada [10]
Good business ethics are the key to good marketing and success. Ethics portray whether an individual has good judgment, intelligence, and many more things that are essential to business. Without good ethics business as a whole would be ruthless. Some business ethics are even required by the law in some places and there are rules and regulation to trade. 

Hope that answered your question!
6 0
3 years ago
Other questions:
  • Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?A. Collision avoidan
    12·1 answer
  • I want to customize my company's logo, name, address, and similar details in all my business documents what option should use?
    12·1 answer
  • An intranet is an external network.TrueFalse
    15·1 answer
  • What are three new things in Microsoft Word 2016?
    5·1 answer
  • Why is the stateless nature of the internet a problem for shopping cart software? g?
    5·2 answers
  • The partners of a small architectural firm are constantly busy with evolving client requirements. To meet the needs of their cli
    11·1 answer
  • The true or false questions.
    13·1 answer
  • EX 3.8 Write code to declare and instantiate an object of the Random class (call the object reference variable rand). Then write
    6·1 answer
  • When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
    11·1 answer
  • Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!