A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO) . Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?
A) Open the document on an air-gapped network.
B) View the document's metadata for origin clues.
C) Search for matching file hashes on malware websites.
D) Detonate the document in an analysis sandbox.
Correct Answer:
Verified
Q36: A company recently set up an e-commerce
Q37: An organization wants to implement a third
Q38: Which of the following refers to applications
Q39: In which of the following situations would
Q40: Which of the following would MOST likely
Q42: An organization has a growing workforce that
Q43: A cybersecurity administrator has a reduced team
Q44: A public relations team will be taking
Q45: Which of the following ISO standards is
Q46: A security analyst is performing a forensic
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents