An incident response analyst at a large corporation is reviewing proxy log data. The analyst believes a malware infection may have occurred. Upon further review, the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO) . Which of the following is the best NEXT step for the analyst to take?
A) Call the CEO directly to ensure awareness of the event
B) Run a malware scan on the CEO's workstation
C) Reimage the CEO's workstation
D) Disconnect the CEO's workstation from the network
Correct Answer:
Verified
Q825: A security engineer wants to add SSL
Q826: A network administrator is creating a new
Q827: Ann, a security analyst, wants to implement
Q828: A security administrator has replaced the firewall
Q829: Which of the following development models entails
Q831: A company wants to provide centralized authentication
Q832: A company needs to implement a system
Q833: Which of the following uses tokens between
Q834: Which of the following are used to
Q835: A security administrator is reviewing the following
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents