<< Prev Question

Question 15/15

According to the National Institute of Standards and Technology (NIST) cybersecurity framework, incident handling activities can be divided into phases.
In which incident handling phase do you quarantine a compromised host in order to prevent an adversary from using it as a stepping stone to the next phase of an attack?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *