1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
3 years ago
5

When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is

the first thing you should do to the workstation or system and why?
2. When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated?

3. What is the SANS Institute’s six-step incident handling process?

4. What is the risk of starting to contain an incident prior to completing the identification process?

5. Why is it a good idea to have a security policy that defines the incident response process in your organization?

6. The post-mortem, lessons learned step is the last in the incident response process. Why is this the most important step in the process?
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
7 0

Answer:

1) When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise,The first thing you should do is to perform a review of every security and service account in the system and all of the connected systems because what you are looking for accounts that shouldnt be in the system

2) When an antivirus program identifies a virus and quarantines this file, The  virus and any other malicious malware/software is eradicated from the system at that particular time.

3) SANS Institute’s six-step incident handling process are: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.

4)  the risk of starting to contain an incident prior to completing the identification process is very little if any.

5) it is a good idea to have a security policy that defines the incident response process in your organization because the Incident response team is responsible for receiving, reviewing, and responding to computer security incident reports.

6) The post-mortem, lessons learned step is the last in the incident response process are;

- There should be a scheduled follow-up meeting to discuss the incident and make recommendations to improve the incident handling plan.

This is the most important step in the process because it helps to prevent future occurrences of the incident that have happened before.

Explanation:

You might be interested in
Which of these best describes augmented reality?
Mandarinka [93]
Integrating 3D graphics to provide a live, direct, or indirect view of a physical real-world
3 0
3 years ago
The most common cause of foodborne illness is
nignag [31]

Answer:

Food posioning

Explanation:

8 0
4 years ago
Read 2 more answers
Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed.
GenaCL600 [577]
Snhahshshshshshhshshshsshhshshshshhs
5 0
3 years ago
When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What simi
My name is Ann [436]

Answer:

When you put a 0 on the right side of a binary number it multiplies it by 2

Explanation:

6 0
3 years ago
The macro command is available on the ___ tab<br> Home<br> Insert<br> View<br> Design
nataly862011 [7]

      Answer                     : Insert tab                                              

5 0
3 years ago
Read 2 more answers
Other questions:
  • If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
    5·1 answer
  • What are some of the good effects of social media
    7·1 answer
  • Which computer device is used to capture or copy a photograph to place in a report?
    14·1 answer
  • ¿Por qué es importante generar proyectos innovadores?
    8·1 answer
  • 1.What is aperture priority mode? When might you use this mode on a camera?
    12·1 answer
  • What does the gravity setting of a jump control?
    13·1 answer
  • What is computer forensics? Where and how would an IT auditor use thisresource?
    12·1 answer
  • Which approach to bandwidth usage consumes all of the available frequencies on a medium to transmit data
    7·1 answer
  • A service that enables a customer to build and run their own applications but doesn't include extensive access to hardware and m
    8·1 answer
  • HELPPPPP!!! Performance Check: Mini-Quiz
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!