A user from the sales department opened a suspicious file attachment. The sales department then contacted the SOC to investigate a number of unresponsive systems, and the team successfully identified the file and the origin of the attack.
Which of the following is the NEXT step of the incident response plan?
imather
Highly Voted 9 months agoLuigismansion
Most Recent 9 months, 1 week agoBiteSize
9 months, 3 weeks agog_
1 year, 1 month agopractical_93
1 year, 5 months agoEZPASS
1 year, 8 months ago