New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSS Exam - Topic 5 Question 51 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 51
Topic #: 5
[All ECSS Questions]

Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Makeda
4 months ago
I’m surprised this is even a question!
upvoted 0 times
...
Adolph
4 months ago
Wait, are we sure it's not detection?
upvoted 0 times
...
Elly
4 months ago
Containment is key to stopping the spread.
upvoted 0 times
...
Lenita
4 months ago
I thought it was eradication?
upvoted 0 times
...
Kara
4 months ago
It's definitely containment!
upvoted 0 times
...
Lashawn
5 months ago
Preparation might involve planning for incidents, but it doesn’t really limit the spread, so I’m pretty sure it’s containment.
upvoted 0 times
...
Melissa
5 months ago
I’m leaning towards eradication, but that seems more about removing the threat after it’s contained.
upvoted 0 times
...
Stefan
5 months ago
I remember practicing a question like this, and I think detection is more about identifying the issue rather than limiting it.
upvoted 0 times
...
Tresa
5 months ago
I think containment is the right answer since it’s about stopping the incident from spreading, but I’m not 100% sure.
upvoted 0 times
...
Vincenza
5 months ago
The virus-type scan seems like it would be the most intensive, as it has to check for a wide range of known virus signatures.
upvoted 0 times
...
Lili
5 months ago
Hmm, this seems like a straightforward question. Azure Cache for Redis should be able to handle the session state and HTTP response requirements.
upvoted 0 times
...
Margarita
5 months ago
I've got a good strategy for this. I'll eliminate the options that don't seem relevant to an IPv6 fallback scenario, then select the two that best fit the description.
upvoted 0 times
...

Save Cancel