D - because option C it doesn’t directly contain the incident. Automated detection helps in early identification, but it doesn’t stop the spread or limit the impact of an incident once it has occurred.
One of the first actions for a compromised IaaS element (e.g web server) is to isolate it from the production network and then engage on further containment / eradication activities.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Booict
3Â months, 3Â weeks agoSHERLOCKAWS
11Â months, 1Â week agoSoleandheel
11Â months, 4Â weeks agoCyberbug2021
12Â months agoAlexJacobson
9Â months, 3Â weeks agoPOWNED
9Â months, 3Â weeks agorichck102
1Â year, 1Â month ago