What is the third step of the incident response process?

  • Recovery
  • Lessons learned
  • Containment
  • Eradication

CompTIA Security+ SY0-501
  • Threats, Attacks and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
    • This question is filed here
  • Cryptography and PKI