What is the third step of the incident response process?

  • Eradication
  • Recovery
  • Containment
  • Lessons learned

CompTIA Security+ SY0-501
  • Threats, Attacks and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
    • This question is filed here
  • Cryptography and PKI