What is the most recommended action to prepare for the eradication of compromised accounts and computers?

Prepare for the CompTIA Security+ SY0-601 exam. Explore comprehensive flashcards and diverse multiple-choice questions with hints and explanations. Get exam-ready now!

Isolating compromised accounts and computers is a recommended action because it helps contain the potential threat and prevents further damage to the network and data. By isolating these affected entities, security teams can limit the attacker's access and prevent the spread of malware, data theft, or other malicious activities.

Isolation involves taking the compromised accounts or systems offline or placing them in a separate environment where they cannot interact with the rest of the network. This allows for a thorough investigation and remediation process to occur without the risk of the threat propagating. It also facilitates the identification of the method of compromise and the extent of the damage, enabling more effective recovery strategies.

Quarantining compromised accounts, while somewhat similar, may not always lead to complete isolation. Segmenting accounts into a honeynet primarily focuses on trapping and analyzing attackers in a controlled environment rather than addressing the immediate threat. Logging off and deleting compromised accounts can result in a loss of valuable forensic information and may not allow for the necessary analysis to understand how the breach occurred.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy