Incident Response Procedures
Match incident response phases with appropriate actions and procedures. This helps students understand what steps should be taken during each phase of the incident response lifecycle according to best practices.
Some options will have multiple correct answers.
Restore systems and data from clean backups
Apply short-term fixes or network segmentation
Remove malware and malicious artifacts
Analyze logs and alerts to detect anomalies
Establish and train response team roles and responsibilities
Disable compromised user accounts and credentials
Develop incident response plan
Monitor systems and validate normal operations
Update incident response plan and security controls
Validate and categorize security incidents
Conduct post-incident review and root cause analysis
Isolate affected systems to prevent spread
Preparation
Lessons Learned
Containment
Identification
Eradication
Recovery