ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 85 - CS0-003 discussion

Report
Export

A security analyst discovers an ongoing ransomware attack while investigating a phishing email. The analyst downloads a copy of the file from the email and isolates the affected workstation from the network. Which of the following activities should the analyst perform next?

A.
Wipe the computer and reinstall software
Answers
A.
Wipe the computer and reinstall software
B.
Shut down the email server and quarantine it from the network.
Answers
B.
Shut down the email server and quarantine it from the network.
C.
Acquire a bit-level image of the affected workstation.
Answers
C.
Acquire a bit-level image of the affected workstation.
D.
Search for other mail users who have received the same file.
Answers
D.
Search for other mail users who have received the same file.
Suggested answer: D

Explanation:

Searching for other mail users who have received the same file is the best activity to perform next, as it helps to identify and contain the scope of the ransomware attack and prevent further damage. Ransomware is a type of malware that encrypts files on a system and demands payment for their decryption. Ransomware can spread through phishing emails that contain malicious attachments or links that download the ransomware. By searching for other mail users who have received the same file, the analyst can alert them not to open it, delete it from their inboxes, and scan their systems for any signs of infection. The other activities are not as urgent or effective as searching for other mail users who have received the same file, as they do not address the immediate threat of ransomware spreading or affecting more systems. Wiping the computer and reinstalling software may restore the functionality of the affected workstation, but it will also erase any evidence of the ransomware attack and make recovery of encrypted files impossible. Shutting down the email server and quarantining it from the network may stop the delivery of more phishing emails, but it will also disrupt normal communication and operations for the organization. Acquiring a bit-level image of the affected workstation may preserve the evidence of the ransomware attack, but it will not help to stop or remove the ransomware or decrypt the files.

asked 02/10/2024
Arushi Rastogi
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first