CompTIA Security+ Exam SY0-601: Incident Response Process

Next Steps in Incident Response Process

Prev Question Next Question

Question

A systems administrator has isolated an infected system from the network and terminated the malicious process from executing.

Which of the following should the administrator do NEXT according to the incident response process?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

After isolating the infected system and terminating the malicious process from executing, the next step in the incident response process depends on the severity of the incident and the organization's policies and procedures.

However, the general recommended next step in the incident response process would be to perform a forensic analysis of the system to identify the root cause of the incident and assess the extent of the damage. The goal of the forensic analysis is to collect and preserve evidence to aid in identifying the attacker and prevent future attacks.

Once the forensic analysis is complete, the administrator should document the lessons learned from the incident, including the root cause, the impact, and the actions taken to mitigate the incident. This documentation can be used to improve the organization's security posture and incident response plan.

After documenting the lessons learned, the administrator should determine whether any data was lost or corrupted as a result of the incident. If data was lost or corrupted, the administrator should attempt to restore it from a backup if available.

If the incident involves personal identifiable information or other sensitive data, the administrator may need to notify regulatory agencies or other stakeholders, such as customers or partners, in accordance with applicable laws and regulations.

Lastly, if the system is determined to be irreparable or the risk is too high to allow it to be put back into use, the administrator should wipe the system and ensure that it is securely disposed of to prevent any sensitive data from being compromised.

Therefore, the most appropriate next step in this scenario would be to document the lessons learned from the incident.