which of the following actions should be performed first?

Once an intrusion into your organizations information system has been detected, which of the
following actions should be performed first?

Once an intrusion into your organizations information system has been detected, which of the
following actions should be performed first?

A.
Eliminate all means of intruder access

B.
Contain the intrusion

C.
Determine to what extent systems and data are compromised

D.
Communicate with relevant parties



Leave a Reply 1

Your email address will not be published. Required fields are marked *

sixteen − four =


Jamal Ahmed

Jamal Ahmed

check