When a Web server is invaded from an outside source and its content is tampered with,
which of the following is the appropriate course of actions to be taken?
1
Analyze the server, IDS (Intrusion Detection System), and firewall logs to
identify the access method, the extent of the impact, and the route of entry.
2 Rebuild the system, and then apply the latest patches and security setup data.
3 Disconnect the server from the network.
4 Connect the server to the network, and monitor its operation for a while