subject

Lab assessment questions & answers 1. when you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? 2. when an antivirus program identifies a virus and quarantines this file, has the malware been eradicated? 3. what is the sans institute’s six-step incident handling process? 4. what is the risk of starting to contain an incident prior to completing the identification process? 5. why is it a good idea to have a security policy that defines the incident response process in your organization? 6. the post-mortem, lessons learned step is the last in the incident response process. why is this the most important step in the process?

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:30
Hassan is writing his master’s thesis, which is a thirty-page document. he received some feedback from his professor in the form of comments, but does not see where the comments are. what is the fastest way for hassan to find the feedback?
Answers: 3
question
Computers and Technology, 22.06.2019 23:30
What are listed in the vertical columns across the top of the event editor? a. file names b. conditions c. check marks d. action types
Answers: 1
question
Computers and Technology, 25.06.2019 16:00
Which function would you use to make sure all names are prepared for a mailing label?
Answers: 2
question
Computers and Technology, 25.06.2019 19:50
What is the leading use of computers
Answers: 3
You know the right answer?
Lab assessment questions & answers 1. when you are notified that a user’s workstation or system...
Questions
question
Mathematics, 04.03.2021 01:00
question
Mathematics, 04.03.2021 01:00
question
Mathematics, 04.03.2021 01:00
question
Mathematics, 04.03.2021 01:00
Questions on the website: 13722359