Which initial step should be followed when a security breach is found on a corporate system?
- Create a drive image of the system.
- Isolate the infected system.
- Establish a chain of custody.
- Photograph the system.
Exam with this question: CCNA Security Chapter 11 Exam Answers
Please login or Register to submit your answer