Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam SY0-601 Topic 5 Question 87 Discussion

Actual exam question for CompTIA's SY0-601 exam
Question #: 87
Topic #: 5
[All SY0-601 Questions]

An organization has hired a red team to simulate attacks on its security pos-ture, which Of following will the blue team do after detecting an IOC?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Curt
3 months ago
Reimaging the impacted workstations could also be a good option to ensure the security of the network.
upvoted 0 times
...
Hermila
3 months ago
I believe they might also activate runbooks for incident response to contain the attack.
upvoted 0 times
...
Maryln
3 months ago
Hey, at least they hired a red team. Keeps the blue team on their toes, you know?
upvoted 0 times
Teri
2 months ago
B) Activate runbooks for incident response.
upvoted 0 times
...
Helga
2 months ago
A) Reimage the impacted workstations.
upvoted 0 times
...
...
Alethea
3 months ago
I agree with Daniela, conducting forensics is crucial to understand the extent of the compromise.
upvoted 0 times
...
Daniela
3 months ago
I think the blue team will conduct forensics on the compromised system.
upvoted 0 times
...
Marcelle
3 months ago
A) Reimage the impacted workstations. Fresh start, clean slate, what could go wrong?
upvoted 0 times
...
Penney
3 months ago
D) Conduct passive reconnaissance to gather information. Sneaky, but it might just give us the edge we need.
upvoted 0 times
...
Charlie
3 months ago
B) Activate runbooks for incident response. Standard operating procedure, can't go wrong with that.
upvoted 0 times
Scarlet
2 months ago
C) Conduct forensics on the compromised system.
upvoted 0 times
...
Andra
2 months ago
B) Activate runbooks for incident response.
upvoted 0 times
...
Lashaun
2 months ago
A) Reimage the impacted workstations.
upvoted 0 times
...
...
Billye
3 months ago
C) Conduct forensics on the compromised system. Gotta get to the bottom of this breach!
upvoted 0 times
Cyndy
2 months ago
C) Conduct forensics on the compromised system.
upvoted 0 times
...
Carlee
2 months ago
B) Activate runbooks for incident response.
upvoted 0 times
...
Lemuel
3 months ago
A) Reimage the impacted workstations.
upvoted 0 times
...
...

Save Cancel