FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The steps an organisation should take after an attack include:Investigate, Respond, Manage, Recover. However one step is missing which is it?
A
Report
B
Disconnect
C
Disinfect
D
Analyse
Explanation: 

Detailed explanation-1: -Contain the Cybersecurity Breach You should change all affected or vulnerable passwords immediately. Create new, strong passwords for each account, and refrain from reusing the same passwords on multiple accounts. That way, if a data breach happens again in the future, the damage may be limited.

There is 1 question to complete.