A security analyst receives an escalation regarding an unidentified connection on the Accounting A1 server within a monitored zone. The analyst pulls the logs and discovers that a Powershell process and a WMI tool process were started on the server after the connection was established and that a PE format file was created in the system directory. What is the next step the analyst should take?
A) Isolate the server and perform forensic analysis of the file to determine the type and vector of a possible attack
B) Identify the server owner through the CMDB and contact the owner to determine if these were planned and identifiable activities
C) Review the server backup and identify server content and data criticality to assess the intrusion risk
D) Perform behavioral analysis of the processes on an isolated workstation and perform cleaning procedures if the file is malicious
Correct Answer:
Verified
Q24: An employee abused PowerShell commands and script
Q25: An engineer implemented a SOAR workflow to
Q26: How is a SIEM tool used?
A) To
Q27: What is the HTTP response code when
Q28: Q30: Refer to the exhibit. Which indicator of Q31: A customer is using a central device Q32: An engineer receives a report that indicates Q33: Q34: Unlock this Answer For Free Now! View this answer and more for free by performing one of the following actions Scan the QR code to install the App and get 2 free unlocks Unlock quizzes for free by uploading documents