What is the primary reason for isolating compromised systems during an incident response?
Prevent malware spread
Identify attack source
Minimize business disruption
Collect evidence

Ethical Hacking Exercises are loading ...