During an incident response, an organization identifies that multiple systems have been compromised. What is the BEST approach to accurately determine the scope of the compromise?
Conduct thorough log analysis and correlate findings with known Indicators of Compromise (IoCs)
Perform a quick scan using antivirus software on all systems
Re-image all suspected systems and return them to operation
Isolate all potentially compromised systems from the network