186k views
4 votes
Alice is responding to a cybersecurity incident and notices a system that she suspects is compromised. She places this system on a quarantine VLAN with limited access to other networked systems. What containment strategy is Alice pursuing?

A. Eradication
B. Isolation
C. Segmentation
D. Removal

1 Answer

4 votes

Final answer:

Alice is using the Isolation strategy in cybersecurity, placing the suspect system in a quarantine VLAN to limit its network interaction and contain potential damage.

Step-by-step explanation:

Alice is practicing a cybersecurity containment strategy known as Isolation. This strategy involves placing a potentially compromised system into a quarantine VLAN to limit its interaction with other networked systems. The goal is to contain any damage by preventively segregating the suspect system from the rest of the network to stop the spread of a possible infection or intrusion. In cybersecurity incident response, containment is a crucial phase that secures the network by isolating affected systems while further investigation and remediation efforts take place.

User Matthew Dalton
by
9.0k points