Ann, a member of the finance department at a large corporation, has submitted a suspicious email she received to the information security team. The team was not expecting an email from Ann, and it contains a PDF file inside a ZIP compressed archive. The information security learn is not sure which files were opened. A security team member uses an air-gapped PC to open the ZIP and PDF, and it appears to be a social engineering attempt to deliver an exploit.
Which of the following would provide greater insight on the potential impact of this attempted attack?
A . Run an antivirus scan on the finance P
C . Use a protocol analyzer on the air-gapped P
E . Perform reverse engineering on the document.
F . Analyze network logs for unusual traffic.
G . Run a baseline analyzer against the user’s computer.
Answer: C
Latest ITILFND_V4 Dumps Valid Version with 428 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund