CompTIA CySA+ CS0-003 Practice Question
You are responding to a security breach at a company where attackers have targeted web applications. According to the practices advised in the OWASP Testing Guide, which of the following would be the best initial step to ensure you've secured the necessary data for a thorough analysis of the application vulnerabilities exploited in the attack?
Performing an exhaustive code review on the current web applications
Examining user behavior patterns for anomalies in application usage
Securing and analyzing the web server logs
Immediately reviewing all account integrity for signs of compromise