Incident Response Procedures
Match incident response phases with appropriate actions and procedures. This helps students understand what steps should be taken during each phase of the incident response lifecycle according to best practices.
Some options will have multiple correct answers.
Restore systems and data from clean backups
Monitor systems and validate normal operations
Develop incident response plan
Analyze logs and alerts to detect anomalies
Validate and categorize security incidents
Remove malware and malicious artifacts
Isolate affected systems to prevent spread
Conduct post-incident review and root cause analysis
Establish and train response team roles and responsibilities
Update incident response plan and security controls
Disable compromised user accounts and credentials
Apply short-term fixes or network segmentation
Preparation
Identification
Lessons Learned
Eradication
Recovery
Containment