A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)
An analyst finds .xyz files of unknown origin that are large and undetected by antivirus. What action should be taken next?
A threat actor has successfully attacked an organization and gained access to confidential files on a laptop. What plan should the organization initiate to contain the attack and prevent it from spreading to other network devices?
Refer to the exhibit.
According to the SNORT alert, what is the attacker performing?
PDF + Testing Engine
|
---|
$61.25 |
Testing Engine
|
---|
$47.25 |
PDF (Q&A)
|
---|
$40.25 |
Cisco Free Exams |
---|
![]() |