A financial services firm discovers a sophisticated malware infection on a server processing customer data. According to the NIST SP 800-61 incident response lifecycle, which of the following is a primary objective of the 'Containment, Eradication, and Recovery' phase?
-
A
Conducting a post-incident review to document lessons learned.
-
B
Developing an incident response policy and training the response team.
-
C
Isolating the affected server from the network to prevent the malware from spreading.
-
D
Analyzing network traffic logs to determine the initial attack vector.