• Post author:
  • Post category:Updated
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

What information is gathered by the CSIRT when determining the scope of a security incident?

  • the networks, systems, and applications affected by an incident
  • the strategies and procedures used for incident containment
  • the processes used to preserve evidence
  • the amount of time and resources needed to handle an incident
Answers Explanation & Hints:

The scoping activity performed by the CSIRT after an incident determines which networks, systems, or applications are affected; who or what originated the incident; and how the incident is occurring.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 26 – 28: Analyzing Security Data Group Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments