Multiple Choice
A security engineer discovers that a spreadsheet containing confidential information for nine of their employees was fraudulently posted on a competitor's website. The spreadsheet contains names, salaries, and social security numbers. What is the next step the engineer should take in this investigation?
A) Determine if there is internal knowledge of this incident.
B) Check incoming and outgoing communications to identify spoofed emails.
C) Disconnect the network from Internet access to stop the phishing threats and regain control.
D) Engage the legal department to explore action against the competitor that posted the spreadsheet.
Correct Answer:

Verified
Correct Answer:
Verified
Q77: A threat actor has crafted and sent
Q78: An organization suffered a security breach in
Q79: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q80: Refer to the exhibit. A security analyst
Q81: How does Wireshark decrypt TLS network traffic?<br>A)
Q83: An organization had several cyberattacks over the
Q84: A company recently completed an internal audit
Q85: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q86: An organization installed a new application server
Q87: According to GDPR, what should be done