Incident Response Flashcards
1
Q
Step 1
A
Detection: An alert indicates unusual outbound traffic.
2
Q
Step 2
A
Containment: Disconnect affected machines and block suspicious domains.
3
Q
Step 3
A
Eradication: Identify malware, remove it, and patch the vulnerability.
4
Q
Step 4
A
Recovery: Restore systems from backups and monitor for lingering threats.
5
Q
Step 5
A
Post-Incident Review: Analyze the incident, update policies, and train employees.