Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
Restore affected systems for normal operations.
Mitigate exploited vulnerabilities to stop future incidents.
Estimate the amount of damage caused by the incident.
Isolate affected systems to prevent further damage
Submit