An organization has recently deployed an EDR solution across its laptops, desktops, and server infrastructure. The organization's server infrastructure is deployed in an IaaS environment. A database within the non-production environment has been misconfigured with a routable IP and is communicating with a command and control server.
Which of the following procedures should the security responder apply to the situation? (Choose two.)
AB1938
3 years, 1 month agovorozco
3 years, 2 months agoAixelsyd
3 years, 10 months agoD1960
3 years, 7 months ago