Bird
0
0

After a cyber attack, a company wants to ensure both eradication and recovery are effective. Which combined approach best supports this goal?

hard🚀 Application Q15 of 15
Cybersecurity - Incident Response
After a cyber attack, a company wants to ensure both eradication and recovery are effective. Which combined approach best supports this goal?
AErase all data and reinstall systems without backups or scans
BRestore backups first, then scan for threats, and ignore system logs
COnly monitor network traffic without removing threats or restoring data
DRemove threats, then restore clean backups, and verify system integrity
Step-by-Step Solution
Solution:
  1. Step 1: Combine eradication and recovery best practices

    Effective eradication removes threats; recovery restores clean data and systems.
  2. Step 2: Add verification for system integrity

    Verifying system integrity ensures no hidden threats remain after restoration.
  3. Final Answer:

    Remove threats, then restore clean backups, and verify system integrity -> Option D
  4. Quick Check:

    Eradication + Recovery + Verification = Remove threats, then restore clean backups, and verify system integrity [OK]
Quick Trick: Remove threats, restore clean data, verify system health [OK]
Common Mistakes:
MISTAKES
  • Restoring before removing threats
  • Ignoring system verification
  • Skipping backups or scans

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes