2
answers
1
watching
196
views

A security analyst observes the following while looking through network traffic in a company's cloud log:

Which of the following steps should the security analyst take FIRST?

A.  Quarantine 10.0.5.52 and run a malware scan against the host.

B.  Access 10.0.5.52 via EDR and identify processes that have network connections.

C.  Isolate 10.0.50.6 via security groups.

 D.  Investigate web logs on 10.0.50.6 to determine if this is normal traffic.

For unlimited access to Homework Help, a Homework+ subscription is required.

Avatar image
Read by 1 person

Unlock all answers

Get 1 free homework help answer.
Already have an account? Log in
Avatar image
Read by 1 person
Already have an account? Log in

Related questions

Related Documents

Weekly leaderboard

Start filling in the gaps now
Log in