CLOUD COMPUTING

CLOUD COMPUTING

DISASTER RECOVERY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What action to take after an attack is described below?Identify when and why the attack happened and establish the severity of the attack.
A
Respond
B
Manage
C
Recover
D
Investigate
E
Analyse
Explanation: 

Detailed explanation-1: -If you know or suspect that the compromised system contains sensitive data, please take these steps: Do not attempt to investigate or remediate the compromise on your own. Instruct any users to stop work on the system immediately. Do not power down the machine.

Detailed explanation-2: -Detection (identification) One of the most important steps in the incident response process is the detection phase. Detection, also called identification, is the phase in which events are analyzed in order to determine whether these events might comprise a security incident.

Detailed explanation-3: -Step 1: Detection and Identification Begin documenting your response as you identify what aspects of your system have been compromised and what the potential damage is. This step is contingent on monitoring your network and systems so that any irregularities are flagged immediately.

There is 1 question to complete.