Preview Mode — This PBQ requires a Premium Membership and is being shown in a read-only preview mode.     See Plans

Incident Response Procedures

Match incident response phases with appropriate actions and procedures. This helps students understand what steps should be taken during each phase of the incident response lifecycle according to best practices.

Some options will have multiple correct answers.


Apply short-term fixes or network segmentation
Monitor systems and validate normal operations
Analyze logs and alerts to detect anomalies
Disable compromised user accounts and credentials
Establish and train response team roles and responsibilities
Validate and categorize security incidents
Isolate affected systems to prevent spread
Remove malware and malicious artifacts
Update incident response plan and security controls
Restore systems and data from clean backups
Develop incident response plan
Conduct post-incident review and root cause analysis
Preparation
Containment
Eradication
Recovery
Lessons Learned
Identification