A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes and unusual network traffic. Which of the following incident response steps should be performed next?
gomet2000
Highly Voted 10Â months, 2Â weeks agoChopSNap
Most Recent 7Â months, 1Â week agoluiiizsoares
8Â months, 1Â week agoTurboMor
10Â months ago