A user from the sales department opened a suspicious file attachment. The sales department then contacted the SOC to investigate a number of unresponsive systems, and the team successfully identified the file and the origin of the attack.
Which of the following is the NEXT step of the incident response plan?
imather
Highly Voted 10 months, 2 weeks agoLuigismansion
Most Recent 10 months, 4 weeks agoBiteSize
11 months, 1 week agof7bc9da
1 month, 2 weeks agog_
1 year, 3 months agopractical_93
1 year, 6 months agoEZPASS
1 year, 10 months ago