subject

Acomputer emergency response team is called at midnight to investigate a case in which a mail server was restarted. after an initial investigation, it was discovered that email is being exfiltrated through an active connection. which of the following is the next step the team should take? a. perform eradication of the active connection and recoverb. identify the source of the active connectionc. format the server and restore its initial configurationd. perform a containment procedure by disconnecting the serverd. perform a containment procedure by disconnecting the server

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 18:30
Ineed on my history if anyone can check out the last few questions i posted and i will be posting !
Answers: 2
question
Computers and Technology, 21.06.2019 20:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data.
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
Plz ( which is an example of a good url?
Answers: 1
question
Computers and Technology, 24.06.2019 09:30
What is the definition of digital literacy?
Answers: 1
You know the right answer?
Acomputer emergency response team is called at midnight to investigate a case in which a mail server...
Questions
question
Mathematics, 10.12.2020 20:30
question
Mathematics, 10.12.2020 20:30
question
History, 10.12.2020 20:30