The second section focuses upon agile threat response —that is, the technologies and processes in place at your organization to respond to a security or ransomware incident quickly, limiting its impact.
If your organization experiences a successful ransomware attack, how will you most likely remediate the threat to impacted applications and data? (please check one)