Which of the follow...
 
Notifications
Clear all

Which of the following should be the team's NEXT step during the detection phase of this response process?

1 Posts
1 Users
0 Likes
171 Views
(@casausisaiah)
Noble Member
Joined: 2 years ago
Posts: 710
Topic starter  

A team of security analysis has been alerted to potential malware activity. The initial examination indicates one of the affected workstations on beaconing on TCP port 80 to five IP addresses and attempting to spread across the network over port 445.

Which of the following should be the team's NEXT step during the detection phase of this response process?

  • A . Escalate the incident to management, who will then engage the network infrastructure team to keep them informed
  • B . Depending on system critically remove each affected device from the network by disabling wired and wireless connections
  • C . Engage the engineering team to block SMB traffic internally and outbound HTTP traffic to the five IP addresses Identify potentially affected systems by creating a correlation
  • D . Identify potentially affected system by creating a correlation search in the SIEM based on the network traffic.

Show Answer Hide Answer

Suggested Answer: D

   
Quote
Topic Tags

Latest CS0-002 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: