When a Trojan is suspected to have infected a computer, the first course of action should be to contain the damage to prevent the malware from spreading or causing further harm. This involves disconnecting the infected device from the network to isolate it and prevent the Trojan from communicating with potential command and control servers or infecting other systems123.
While informing the Incident Response Team (IRT) and other members of the organization is also important, these actions come after the immediate threat has been contained. Therefore, the correct answer is to contain the damage (A), which aligns with the Certified Network Defender (CND) objectives that prioritize immediate containment to minimize the impact of security incidents45678.
References: The response is based on best practices for dealing with Trojans as outlined in network security and incident response guidelines, including those from the EC-Council’s Certified Network Defender (CND) program. The CND framework emphasizes the importance of quick containment to protect network integrity and prevent further damage45678.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit