135k views
2 votes
The Incident Response Team must ensure that the recovery from web application incidents is implemented in chronological order. Which are the first two steps of this recovery method?

a. 1. Identify the vulnerabilities attackers had exploited and patch them and 2. Scan all the web application resources such as servers and databases for malware and traces of attack and remove them
b. 1. Identify the vulnerabilities attackers had exploited and patch them and 2. Check if the application has recovered completely along with the user accounts, privileges and configurations
c. 1. Identify the vulnerabilities attackers had exploited and patch them and 2. Use an access control to matrix and define access control rules with list of accessible and authorized requests
d. 1. Identify the vulnerabilities attackers had exploited and patch them and 2. Restore the web servers and databases from clean and trusted backups

User Pedja
by
8.6k points

1 Answer

2 votes

Final answer:

The first two steps in the recovery method for web application incidents are to identify and patch vulnerabilities and scan for malware and traces of attack. The correct answer is B.

Step-by-step explanation:

The first two steps in the recovery method for web application incidents are:

Identify the vulnerabilities attackers had exploited and patch them.

Scan all the web application resources such as servers and databases for malware and traces of attack and remove them.

These steps are crucial in ensuring the recovery process is implemented in chronological order and helps to enhance the security and integrity of the web applications.

The first two steps of recovery from web application incidents are identifying and patching exploited vulnerabilities and restoring web servers and databases from trusted backups.

The first two steps in the recovery method from web application incidents are 1. Identify the vulnerabilities attackers had exploited and patch them and 2. Restore the web servers and databases from clean and trusted backups. Beginning with the identification of vulnerabilities ensures that the same attack cannot occur immediately after recovery, while restoring from backups is a key step in eliminating any remains of the incident and returning to normal operations. Patching vulnerabilities might include software updates or configuration changes to strengthen security, and restoring operations involves checking the integrity of backups before they are used to overwrite compromised systems.

User Christopher Z
by
8.0k points

No related questions found