Which of the following actions should lake place immediately after a security breach is reported to an information security manager?
A. Confirm the incident
B. Determine impact
C. Notify affected stakeholders
D. Isolate the incident
Explanation:
Before performing analysis of impact, resolution, notification or isolation of an incident, ii must be validated as a real security incident.