List of questions
Related questions
Question 279 - CS0-003 discussion
A security analyst has identified a new malware file that has impacted the organization. The malware is polymorphic and has built-in conditional triggers that require a connection to the internet. The CPU has an idle process of at least 70%. Which of the following best describes how the security analyst can effectively review the malware without compromising the organization's network?
A.
Utilize an RDP session on an unused workstation to evaluate the malware.
B.
Disconnect and utilize an existing infected asset off the network.
C.
Create a virtual host for testing on the security analyst workstation.
D.
Subscribe to an online service to create a sandbox environment.
Your answer:
0 comments
Sorted by
Leave a comment first