PdfPrep.com

Which of the following actions should the security analyst take FIRST?

The Chief Information Security Officer (CISO) has asked the security analyst to examine abnormally high processor utilization on a key server.

The output below is from the company’s research and development (R&D) server.

Which of the following actions should the security analyst take FIRST?
A . Initiate an investigation
B . Isolate the R&D server
C . Reimage the server
D . Determine availability

Answer: B

Exit mobile version