The BEST approach in managing a security incident involving a successful penetration should be to:

The BEST approach in managing a security incident involving a successful penetration should be
to:

The BEST approach in managing a security incident involving a successful penetration should be
to:

A.
allow business processes to continue during the response.

B.
allow the security team to assess the attack profile.

C.
permit the incident to continue to trace the source.

D.
examine the incident response process for deficiencies.

Explanation:

Since information security objectives should always be linked to the objectives of the business, it is
imperative that business processes be allowed to continue whenever possible. Only when there is
no alternative should these processes be interrupted. Although it is important to allow the security
team to assess the characteristics of an attack, this is subordinate to the needs of the business.
Permitting an incident to continue may expose the organization to additional damage. Evaluating
the incident management process for deficiencies is valuable but it, too. is subordinate to allowing
business processes to continue.



Leave a Reply 0

Your email address will not be published. Required fields are marked *