Company policy states that when a virus or malware alert is received, the suspected host is immediately removed from the company network. Which of the
following BEST describes this component of incident response?
A.
Mitigation
B.
Isolation
C.
Recovery
D.
Reporting
E.
Remediation