CySA+ CS0-001 – Q. 353

0
87

The Chief Information Security Officer (CISO) has asked the security analyst to examine abnormally high processor utilization on a key server. The output below is from the company’s research and development (R&D) server.

Which of the following actions should the security analyst take FIRST?
A. Initiate an investigation
B. Isolate the R&D server
C. Reimage the server
D. Determine availability