A security analyst receives an alert that several internal hosts are communicating with a known command-and-control server. The intrusion detection system (IDS) flagged the activity, but business-critical processes are running on the affected systems.
What should the incident response team do FIRST?
A. Disconnect the affected systems from the network immediately.
B. Validate the IDS alert to confirm whether the activity is a true positive.
C. Notify senior management of a confirmed breach.
D. Begin forensic imaging of the affected systems.