Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?

Posted by: Pdfprep Category: RC0-501 Tags: , ,

Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions:

Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?
A . Eradication
B . Containment
C . Recovery
D . Lessons learned

Answer: C

Leave a Reply

Your email address will not be published.