Which of the following actions should lake place immediately after a security breach is reported to
an information security manager?
A.
Confirm the incident
B.
Determine impact
C.
Notify affected stakeholders
D.
Isolate the incident
Explanation:
Before performing analysis of impact, resolution, notification or isolation of an incident, ii must be
validated as a real security incident.