exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 19 discussion

Actual exam question from Cisco's 350-201
Question #: 19
Topic #: 1
[All 350-201 Questions]

The incident response team receives information about the abnormal behavior of a host. A malicious file is found being executed from an external USB flash drive.
The team collects and documents all the necessary evidence from the computing resource. What is the next step?

  • A. Conduct a risk assessment of systems and applications
  • B. Isolate the infected host from the rest of the subnet
  • C. Install malware prevention software on the host
  • D. Analyze network traffic on the host's subnet
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
TrainingTeam
6 months, 2 weeks ago
Selected Answer: B
After the incident response team has collected and documented all the necessary evidence from the computing resource, the next step is to isolate the infected host from the rest of the subnet. This action is crucial to prevent the spread of the malicious file to other systems on the network. Isolation ensures that the threat is contained and does not propagate, which is a key priority in incident response. Once the host is isolated, further steps such as risk assessment, installation of malware prevention software, and analysis of network traffic can be conducted in a controlled and secure manner
upvoted 1 times
...
ak_technonet
1 year, 11 months ago
Selected Answer: B
B is the best option to take action
upvoted 1 times
...
DrVoIP
2 years, 2 months ago
B. Isolate the infected host from the rest of the subnet. Isolating the infected host from the rest of the subnet is important to prevent the further spread of the malware to other systems on the network. By disconnecting the host from the network, the incident response team can prevent the malware from communicating with any command and control servers or other systems on the network. A. Conducting a risk assessment of systems and applications, C. Installing malware prevention software on the host, and D. Analyzing network traffic on the host's subnet are all important steps in response to a malware incident, but they should be taken after the infected host has been isolated from the network. - GPT
upvoted 1 times
...
Techieoflife
2 years, 9 months ago
Selected Answer: B
B is correct
upvoted 1 times
...
maxson69
3 years, 4 months ago
Answer B is correct
upvoted 1 times
...
Bobster02
3 years, 9 months ago
Short-term containment—limiting damage before the incident gets worse, usually by isolating network segments, taking down hacked production server and routing to failover. https://www.cynet.com/incident-response/incident-response-sans-the-6-steps-in-depth/
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago