Q: 2
A multinational corporation has detected unusual activity suggesting that an attacker has gained access
to the hypervisor layer of their virtual environment. What is the most critical immediate step the security
team should take to mitigate the threat?
Options
Discussion
C imo. Cutting the hypervisor off the network is key for containment before anything else.
Why not check the official guide or incident response playbooks for escalation steps on hypervisor compromise?
D , ISC2 puts too much weight on disconnecting but patching feels more actionable sometimes.
Its D
Containment always takes priority so definitely C here.
Why does ISC2 keep mixing up patching with containment on these? C/D always causes noise, but here it’s C.
Not B, C. Restarting VMs (B) won't help if the attacker already has hypervisor access-they could just get back in or pivot again. Disconnecting (C) is classic containment, lines up with incident response basics. Open to discussion if someone sees it differently.
Likely C is the way to go. Disconnecting the hypervisor cuts off attacker access right away, which matches IR best practices for containment. D trips some folks up since patching is important, but it doesn't stop what's already happening. Open to corrections if I missed something.
Probably C. If the attacker still has access, disconnecting the hypervisor contains any network-based compromise right away.
C tbh
Be respectful. No spam.