A security analyst detects an email server that had been compromised in the internal network. Users have been reporting strange messages in their email inboxes and unusual network traffic. Which of the following incident response steps should be performed next?
gomet2000
Highly Voted 8Â months, 3Â weeks agoChopSNap
Most Recent 5Â months, 2Â weeks agoluiiizsoares
6Â months, 2Â weeks agoTurboMor
8Â months, 1Â week ago