Which containment technique would be the best response when a system is believed to be infected with malware?
Isolate the affected systems
Propagation
Immediately segment the network into the smallest possible groups
Determine the attack vector and disable it
Operations and Incident Response | |
Architecture and Design | |
Implementation | |
Governance, Risk, and Compliance | |
Attacks, Threats, and Vulnerabilities |