After a recent security breach, the network administrator has been tasked to update and backup all router and
switch configurations. The security administrator has been tasked to enforce stricter security policies. All users
were forced to undergo additional user awareness training. All of these actions are due to which of the following
types of risk mitigation strategies?
Implementing policies to prevent data loss
User rights and permissions review
Incident response procedures involve: Preparation; Incident identification; Escalation and notification; Mitigation
steps; Lessons learned; Reporting; Recover/reconstitution procedures; First responder; Incident isolation
(Quarantine; Device removal); Data breach; Damage and loss control. Described in the question is a situation
where a security breach had occurred and its response which shows that lessons have been learned and used
to put in place measures that will prevent any future security breaches of the same kind.