Which of the follow...
 
Notifications
Clear all

Which of the following is the NEXT step the analyst should take?

1 Posts
1 Users
0 Likes
96 Views
(@palomamikel)
Posts: 733
Noble Member
Topic starter
 

During the forensic analysis of a compromised machine, a security analyst discovers some binaries that are exhibiting abnormal behaviors. After extracting the strings, the analyst finds unexpected content.

Which of the following is the NEXT step the analyst should take?

  • A . Only allow whitelisted binaries to execute.
    B. Run an antivirus against the binaries to check for malware.
    C. Use file integrity monitoring to validate the digital signature.
    D. Validate the binaries' hashes from a trusted source.

Show Answer Hide Answer

Suggested Answer: B
 
Posted : 14/02/2023 3:08 pm
Topic Tags

Latest CS0-002 V2 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: