List of questions
Related questions
Question 556 - 312-50v12 discussion
A security analyst is preparing to analyze a potentially malicious program believed to have infiltrated an organization's network. To ensure the safety and integrity of the production environment, the analyst decided to use a sheep dip computer for the analysis. Before initiating the analysis, what key step should the analyst take?
A.
Run the potentially malicious program on the sheep dip computer to determine its behavior
B.
Store the potentially malicious program on an external medium, such as a CD-ROM
C.
Connect the sheep dip computer to the organization's internal network
D.
install the potentially malicious program on the sheep dip computer
Your answer:
0 comments
Sorted by
Leave a comment first