1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
3 years ago
5

When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is

the first thing you should do to the workstation or system and why?
2. When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated?

3. What is the SANS Institute’s six-step incident handling process?

4. What is the risk of starting to contain an incident prior to completing the identification process?

5. Why is it a good idea to have a security policy that defines the incident response process in your organization?

6. The post-mortem, lessons learned step is the last in the incident response process. Why is this the most important step in the process?
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
7 0

Answer:

1) When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise,The first thing you should do is to perform a review of every security and service account in the system and all of the connected systems because what you are looking for accounts that shouldnt be in the system

2) When an antivirus program identifies a virus and quarantines this file, The  virus and any other malicious malware/software is eradicated from the system at that particular time.

3) SANS Institute’s six-step incident handling process are: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.

4)  the risk of starting to contain an incident prior to completing the identification process is very little if any.

5) it is a good idea to have a security policy that defines the incident response process in your organization because the Incident response team is responsible for receiving, reviewing, and responding to computer security incident reports.

6) The post-mortem, lessons learned step is the last in the incident response process are;

- There should be a scheduled follow-up meeting to discuss the incident and make recommendations to improve the incident handling plan.

This is the most important step in the process because it helps to prevent future occurrences of the incident that have happened before.

Explanation:

You might be interested in
HELP BRAINLST!!<br><br> How is labor already being automated in supermarkets?
11Alexandr11 [23.1K]

Answer:

Self-checkouts as well.

Explanation:

6 0
3 years ago
I need the answers. i don’t get this
bixtya [17]
Run,lazy,turtles,slow,wandering, jump,45,weird,pigs, cows, cousins, pale,rude,candles

There are many answers for this but this is what first came to my mind

Hope this helps
4 0
3 years ago
How do you print a document?
Monica [59]
Control + P (push these buttons at the same time)

or right click and print.

if you are printing a webpage, the steps are the same.

if you are using Word, then you just need to find the File tab and print should be in the list.
3 0
3 years ago
The Smith family wants to relocate to a neighborhood with better schools before their three-year-old goes to kindergarten. They
alexdok [17]

byron is a lanlord or real estate agent

taylor is a babysitter or a maid

travis is a banking agent.

8 0
3 years ago
Read 2 more answers
1. What is Visual field? <br>please explain with reference​
marishachu [46]
Visual field: The entire area that can be seen when the eye is directed forward, including that which is seen with peripheral vision
6 0
4 years ago
Other questions:
  • Write a cout statement that prints the value of a conditional expression. The conditional expression should determine whether th
    7·1 answer
  • To include an online picture in a publication, navigate to the _____ tab.
    7·1 answer
  • The Apple II is an IBM-compatible PC "clone.
    8·1 answer
  • Who share the road with an impaired driver are at risk
    7·2 answers
  • What is an example of the most important role of a systems analyst in any corporation?
    10·1 answer
  • An
    9·1 answer
  • Every modern nation has a Central Bank. Which of the following is the Central Bank for these United States?
    14·2 answers
  • what are the three parts to physical security standards for various types of army equipment and the risk level
    15·1 answer
  • How do u mark bralienst
    5·1 answer
  • You and a friend have just started a small business. How could you use the Internet to make your business successful?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!