Comprehensive and Detailed Step-by-Step Explanation:Performing a vulnerability scan during the recovery phase ensures that corrective actions, such as patches or configuration changes, have effectively addressed the vulnerabilities exploited during the incident. This step validates the system’s security before fully restoring operations.
[References:, CompTIA CySA+ Objectives (Domain 3.0 - Incident Response), CompTIA CySA+ Practice Tests (Chapter 3: Containment, Eradication, and Recovery), , , , , ]
Submit