Skip to content
Six Figure Security
  • Home
  • Dashboard
    • Student Registration
    • Checkout
      • My account
      • Shop
      • Purchase
      • Cart
  • Courses
    • Course Catalog
    • CompTIA CySA – CS0-003
    • AWS Foundations
    • ISACA CISM
  • ISC2
    • Certified information system security professional (CISSP)
    • Certified Cloud Security Professional (CCSP)
  • CompTIA
    • CompTIA CLoud+ (CV0-004)
    • CompTIA Cloud Essentials CLO-002
  • AWS
    • Aws Foundations
      • AWS Cloud Practitioner Foundation CLF-C02
      • AWS AI Foundations AIF-C01
    • AWS Associate
      • AWS Certified Solutions Architect SAA‑C03
    • AWS Professional
      • AWS Certified Solutions Architect (SAP‑C02)
    • Specialty
      • AWS Certified Advanced Networking (ANS‑C01)
      • AWS Certified Security SCS‑C02)
  • Microsoft Azure
    • AZ Associate
      • Data Foundations DP-900
    • AZ Fundamental
    • Azure Specialty
Six Figure Security
  • Home
  • Dashboard
    • Student Registration
    • Checkout
      • My account
      • Shop
      • Purchase
      • Cart
  • Courses
    • Course Catalog
    • CompTIA CySA – CS0-003
    • AWS Foundations
    • ISACA CISM
  • ISC2
    • Certified information system security professional (CISSP)
    • Certified Cloud Security Professional (CCSP)
  • CompTIA
    • CompTIA CLoud+ (CV0-004)
    • CompTIA Cloud Essentials CLO-002
  • AWS
    • Aws Foundations
      • AWS Cloud Practitioner Foundation CLF-C02
      • AWS AI Foundations AIF-C01
    • AWS Associate
      • AWS Certified Solutions Architect SAA‑C03
    • AWS Professional
      • AWS Certified Solutions Architect (SAP‑C02)
    • Specialty
      • AWS Certified Advanced Networking (ANS‑C01)
      • AWS Certified Security SCS‑C02)
  • Microsoft Azure
    • AZ Associate
      • Data Foundations DP-900
    • AZ Fundamental
    • Azure Specialty

3.2 Given a scenario, perform incident response activities .

By sixfigure / March 7, 2023
CompTIA CySA – CS0-003 3.2 Given a scenario, perform incident response activities .

• Detection and analysis

  • IoC
  • Evidence acquisitions
    o Chain of custody
    o Validating data integrity
    o Preservation
    o Legal hold
  • Data and log analysis
    • Containment, eradication,
    and recovery
  • Scope
  • Impact
  • Isolation
  • Remediation
  • Re-imaging
  • Compensating controls
Previous Lesson
Back to Course
Next Lesson
← Previous Lesson
Next Lesson →

Copyright © 2026 Six Figure Security

Powered by Six Figure Security