Which containment technique would be the best response when a system is believed to be infected with malware?

  • Propagation
  • Immediately segment the network into the smallest possible groups
  • Determine the attack vector and disable it
  • Isolate the affected systems

CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
    • This question is filed here
  • Governance, Risk, and Compliance