List of questions
Related questions
Question 394 - CAS-004 discussion
A user forwarded a suspicious email to a security analyst for review. The analyst examined the email and found that neither the URL nor the attachment showed any indication of malicious activities. Which of the following intelligence collection methods should the analyst use to confirm the legitimacy of the email?
A.
HUMINT
B.
UEBA
C.
OSINT
D.
RACE
Your answer:
0 comments
Sorted by
Leave a comment first