The correct answer is: c. Consult your security policy
The first thing you do if you suspect that your system has been compromised is consult your security policy. Your security policy will contain the procedures to follow to deal with the compromise. If you do not have a security policy you should immediately consult with management to ensure the recovery effort can be coordinated with other departments such as the media and legal teams. The next step is to regain control of your system, which involves the other options listed.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
<< Back to quiz