Bonney's system has been compromised by a gruesome malware. What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
A.
Complaint to police in a formal way regarding the incident
B.
Turn off the infected machine
C.
Leave it to the network administrators to handle
D.
Call the legal department in the organization and inform about the incident
B. Turn off the infected machine
By turning off the infected machine, you isolate it from the network and prevent the malware from potentially spreading to other systems. After isolating the compromised machine, further actions can be taken to investigate and remediate the incident.
Pg 874: Containment of Malware Incidents
1. Separate the compromised host from the operational network
2. Gather and analyze network logs of the system to find the events of malware propagation through shared files and connected systems
3. In case the malware has compromised multiple systems, you must cut the network services of these systems and prioritize them according to the importance of the affected host for business continuity
This section is not available anymore. Please use the main Exam Page.312-39 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Cube1214
8 months, 2 weeks ago[Removed]
12 months agofroi2222
1 year, 7 months agoJohan_gfs
1 year, 8 months agoadosh
1 year, 11 months agoAFLisoc_83
2 years ago