CompTIA Security+ (SY0-601) Certification Practice Test

Question: 1 / 400

What is the most recommended action to prepare for the eradication of compromised accounts and computers?

Quarantining the compromised accounts

Segmenting the compromised accounts into a honeynet

Isolating the compromised accounts and computers

Isolating compromised accounts and computers is a recommended action because it helps contain the potential threat and prevents further damage to the network and data. By isolating these affected entities, security teams can limit the attacker's access and prevent the spread of malware, data theft, or other malicious activities.

Isolation involves taking the compromised accounts or systems offline or placing them in a separate environment where they cannot interact with the rest of the network. This allows for a thorough investigation and remediation process to occur without the risk of the threat propagating. It also facilitates the identification of the method of compromise and the extent of the damage, enabling more effective recovery strategies.

Quarantining compromised accounts, while somewhat similar, may not always lead to complete isolation. Segmenting accounts into a honeynet primarily focuses on trapping and analyzing attackers in a controlled environment rather than addressing the immediate threat. Logging off and deleting compromised accounts can result in a loss of valuable forensic information and may not allow for the necessary analysis to understand how the breach occurred.

Get further explanation with Examzify DeepDiveBeta

Logging off and deleting the compromised accounts

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy