Multiple Choice
Ann, a member of the finance department at a large corporation, has submitted a suspicious email she received to the information security team. The team was not expecting an email from Ann, and it contains a PDF file inside a ZIP compressed archive. The information security team is not sure which files were opened. A security team member uses an air-gapped PC to open the ZIP and PDF, and it appears to be a social engineering attempt to deliver an exploit. Which of the following would provide greater insight on the potential impact of this attempted attack?
A) Run an antivirus scan on the finance PC.
B) Use a protocol analyzer on the air-gapped PC.
C) Perform reverse engineering on the document.
D) Analyze network logs for unusual traffic.
E) Run a baseline analyzer against the user's computer.
Correct Answer:

Verified
Correct Answer:
Verified
Q384: Ann, a corporate executive, has been the
Q385: A network engineer is upgrading the network
Q386: A large company with a very complex
Q387: An infrastructure team within an energy organization
Q388: A threat advisory alert was just emailed
Q390: A security analyst is reviewing the following
Q391: A legacy web application, which is being
Q392: During the decommissioning phase of a hardware
Q393: After the departure of a developer under
Q394: A security consultant is performing a penetration