Multiple Choice
Ann, a member of the finance department at a large corporation, has submitted a suspicious email she received to the information security team. The team was not expecting an email from Ann, and it contains a PDF file inside a ZIP compressed archive. The information security learn is not sure which files were opened. A security team member uses an air-gapped PC to open the ZIP and PDF, and it appears to be a social engineering attempt to deliver an exploit. Which of the following would provide greater insight on the potential impact of this attempted attack?
A) Run an antivirus scan on the finance PC.
B) Use a protocol analyzer on the air-gapped PC.
C) Perform reverse engineering on the document.
D) Analyze network logs for unusual traffic.
E) Run a baseline analyzer against the user's computer.
Correct Answer:

Verified
Correct Answer:
Verified
Q274: A company has created a policy to
Q275: A developer emails the following output to
Q276: An organization is concerned that its hosted
Q277: A manufacturing company recently recovered from an
Q278: An internal application has been developed to
Q280: The Chief Executive Officer (CEO) of a
Q281: A product manager is concerned about the
Q282: Management is reviewing the results of a
Q283: First responders, who are part of a
Q284: The Chief Information Security Officer (CISO) has