Multiple Choice
An organization's Chief Financial Officer (CFO) was the target of several different social engineering attacks recently. The CFO has subsequently worked closely with the Chief Information Security Officer (CISO) to increase awareness of what attacks may look like. An unexpected email arrives in the CFO's inbox from a familiar name with an attachment. Which of the following should the CISO task a security analyst with to determine whether or not the attachment is safe?
A) Place it in a malware sandbox.
B) Perform a code review of the attachment.
C) Conduct a memory dump of the CFO's PC.
D) Run a vulnerability scan on the email server.
Correct Answer:

Verified
Correct Answer:
Verified
Q306: The Chief Financial Officer (CFO) of a
Q307: After investigating virus outbreaks that have cost
Q308: A Chief Information Security Officer (CISO) of
Q309: An internal staff member logs into an
Q310: A software development team has spent the
Q312: A security manager recently categorized an information
Q313: The finance department has started to use
Q314: An engineer maintains a corporate-owned mobility infrastructure,
Q315: To prepare for an upcoming audit, the
Q316: Which of the following are the MOST