After containment, what is the first step of eradicating an attack?
- Patch all vulnerabilities.
- Change all passwords.
- Identify all hosts that need remediation.
- Hold meetings on lessons learned.
Answers Explanation & Hints:
Once an attack is contained, the next step is to identify all hosts that will need remediation so that the effects of the attack can be eliminated. |