An incident response analyst has confirmed that a workstation is infected with malware and is actively communicating with an external command-and-control server. According to the NIST incident response lifecycle, which of the following is the MOST appropriate immediate action?
-
A
Perform a full forensic image of the workstation's hard drive.
-
B
Disconnect the workstation from the network.
-
C
Reimage the workstation from a known good backup.
-
D
Analyze the malware to determine its full capabilities.