Multiple Choice
A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO) . Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?
A) Open the document on an air-gapped network.
B) View the document's metadata for origin clues.
C) Search for matching file hashes on malware websites.
D) Detonate the document in an analysis sandbox.
Correct Answer:

Verified
Correct Answer:
Verified
Q69: Which of the following is MOST likely
Q70: A researcher has been analyzing large data
Q71: An organization is developing an authentication service
Q72: A smart switch has the ability to
Q73: A company provides mobile devices to its
Q75: A retail executive recently accepted a job
Q76: Users at an organization have been installing
Q77: A security analyst receives a SIEM alert
Q78: A security analyst is investigating an incident
Q79: An organization has implemented a policy requiring