Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 53 discussion

Actual exam question from CompTIA's SY0-601
Question #: 53
Topic #: 1
[All SY0-601 Questions]

A security analyst has identified malware spreading through the corporate network and has activated the CSIRT. Which of the following should the analyst do
NEXT?

  • A. Review how the malware was introduced to the network.
  • B. Attempt to quarantine all infected hosts to limit further spread.
  • C. Create help desk tickets to get infected systems reimaged.
  • D. Update all endpoint antivirus solutions with the latest updates.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
rodwave
Highly Voted 1 year, 6 months ago
Selected Answer: B
Answer: Attempt to quarantine all infected hosts to limit further spread. As soon as the malware was identified, the incident response begins. The steps for incident response are: 1. Preparation - Preparing for an attack and how to respond 2. Identification - Identifying the threat 3. Containment - Containing the threat 4. Eradication - Removing the threat 5. Recovery - Recovering affected systems 6. Lessons Learned - Evaluating the incident response, see where there can be improvements for a future incident. In the scenario, the malware has already been identified, which means that we are past the Identification step. The next step would be to begin containment as to limit the amount of damage the malware can cause, so, quarantining infected hosts would be the best option here.
upvoted 29 times
...
varun0
Highly Voted 1 year, 8 months ago
Selected Answer: B
Quarantine to limit further spread
upvoted 16 times
...
Bmoremike71
Most Recent 1 month ago
Selected Answer: B
Quarantine.
upvoted 1 times
...
Roosey
9 months, 2 weeks ago
Selected Answer: B
Quarantine
upvoted 1 times
...
Protract8593
10 months ago
Selected Answer: B
When a security analyst identifies malware spreading through the corporate network and activates the Computer Security Incident Response Team (CSIRT), the immediate next step should be to attempt to quarantine all infected hosts to limit further spread of the malware. Quarantining infected hosts can help contain the malware and prevent it from infecting other systems on the network.
upvoted 2 times
...
ApplebeesWaiter1122
10 months, 3 weeks ago
Selected Answer: B
When a security analyst has identified malware spreading through the corporate network and activated the Computer Security Incident Response Team (CSIRT), the next step would be to attempt to quarantine all infected hosts to limit further spread. This is crucial to prevent the malware from infecting more systems and potentially causing additional damage.
upvoted 1 times
...
RileyG
1 year ago
Selected Answer: B
The sensible next step is to isolate the malware to prevent spread. AKA quarantine the incident.
upvoted 1 times
...
Jacs
1 year, 1 month ago
Selected Answer: C
Could be C because the plan was already activated and one phase included in the IRP states that the threat must be identified and contained which means trying to avoid spreading the virus to the entire company. Then the next logical step must be to reimage the infected PCs.
upvoted 1 times
RevolutionaryAct
8 months, 2 weeks ago
Nope, all that has happened is that the malware was identified and CSIRT was notified: 1. Preparation - Preparing for an attack and how to respond 2. Identification - Identifying the threat << You are here 3. Containment - Containing the threat << Need to go here 4. Eradication - Removing the threat 5. Recovery - Recovering affected systems << Too far into the future 6. Lessons Learned - Evaluating the incident response, see where there can be improvements for a future incident.
upvoted 1 times
...
...
DALLASCOWBOYS
1 year, 3 months ago
B. Quarantine to limit the spread
upvoted 1 times
JarnBarn
5 months, 2 weeks ago
Nah, It's C for Cowboys suuck
upvoted 1 times
...
...
sauna28
1 year, 5 months ago
Selected Answer: B
Phases in the Incident Response Plan 1. Preparation: The organization plans out how they will respond to attack, this can involve: 2. Identification: Detecting and determining whether an incident has occurred. 3. Containment: Once a threat has been identified, the organization must limit or prevent any further damage. 4. Eradication: The removal of the threat 5. Recovery: Restoring systems affected by the incident 6. Lessons Learned: Where the organization reviews their incident response and prepare for a future attack
upvoted 2 times
...
lordguck
1 year, 6 months ago
This question is free for interpretation again :-( A is my bet, whereas B (containment)/C (recovery) could be right, too. By activating the CSIRT his duties regarding containment and recovery could be fullfilled/handed over and the analyst goes to "lessons learnt".
upvoted 1 times
Jossie_C
1 year, 6 months ago
Nope. Step 4 isn't urgent unlike quarantining. It's like COVID: quarantine everyone infected, which is containment, then figure out what happened.
upvoted 2 times
...
...
RonWonkers
1 year, 8 months ago
Selected Answer: B
Incident response cycle, step 2 identification > step 3 containment
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...