Complete the code to identify the phase where malware is removed from the system.
The [1] phase involves removing malicious software from infected devices.
The eradication phase focuses on removing malware and eliminating threats from the system.
Complete the sentence to describe the recovery phase.
During the [1] phase, systems are restored to normal operation after threats are removed.The recovery phase restores systems to normal after threats have been eradicated.
Fix the error in the statement about containment.
The [1] phase is when the threat is completely removed from the system.
Eradication is the phase where the threat is completely removed, not containment.
Fill both blanks to complete the description of the eradication and recovery phases.
In the [1] phase, threats are removed, and in the [2] phase, systems are restored to normal.
Eradication removes threats; recovery restores systems to normal.
Fill all three blanks to complete the incident response steps involving eradication and recovery.
After [1], the [2] phase removes threats, and the [3] phase restores system functionality.
Detection identifies the threat, eradication removes it, and recovery restores systems.