From above provided link:
"The CEH model says that you identify and analyze an incident before you contain or eradicate it. What's more, it's very rare that they'd want you to make a change to the system without using an integrated change management process.
If you're talking a small company or your own web server, unplugging it might make sense. But what's the maximum tolerable downtime for that server? How much damage is this unspecified hack going to do compared to the cost of shutting down the company's web presence?
But that's common sense/real-life talking. For CEH, just memorize the steps in their process (they have a blog article about their steps here):
Prepare
Identify
Contain
Eradicate
Recover
Lessons learned
"
In the above scenario, the company’s web server is hacked. As an IT security engineer, your first task is to unplug the network connection (cable) on the company’s web server from the router and modem in order to prevent further attacks.
the web server must be in a DMZ. It is a question from forensic perspective, he has to get as much info as he can to find the indice of compromision. If heunplug the server then he will not know how to fix the problem.
If you are Polat ALEMDAR you can do it.
https://www.youtube.com/watch?v=yLx9B3xVOw8
upvoted 2 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
greeklover84
5 months, 2 weeks agoYetiSpaghetti
1 year, 10 months agoNikoTomas
8 months, 2 weeks agosalei
1 year, 12 months agoVermil
3 years, 11 months agoamal1302
4 years, 1 month agoSprasashu
4 years, 3 months agohcakyol
4 years, 1 month ago