ECCouncil 212-89 Question Answer
An energy company discovers unusual data transmission patterns in its IoT-based smart grid system, suggesting a potential cybersecurity incident. Given the complexity and criticality, what should be the company’s first step?

