Incident Response Procedures
Match incident response phases with appropriate actions and procedures. This helps students understand what steps should be taken during each phase of the incident response lifecycle according to best practices.
Some options will have multiple correct answers.
Conduct post-incident review and root cause analysis
Validate and categorize security incidents
Develop incident response plan
Restore systems and data from clean backups
Remove malware and malicious artifacts
Establish and train response team roles and responsibilities
Update incident response plan and security controls
Apply short-term fixes or network segmentation
Disable compromised user accounts and credentials
Monitor systems and validate normal operations
Analyze logs and alerts to detect anomalies
Isolate affected systems to prevent spread
Recovery
Containment
Eradication
Lessons Learned
Preparation
Identification