Which containment technique would be the best response when a system is believed to be infected with malware?
Isolate the affected systems
Immediately segment the network into the smallest possible groups
Determine the attack vector and disable it
|Operations and Incident Response|
|Architecture and Design|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|