After a recent malware incident, the forensic investigator is gathering details to identify the breach and causes. The investigator has isolated the affected workstation. What is the next step that should be taken in this investigation?
A) Analyze the applications and services running on the affected workstation.
B) Compare workstation configuration and asset configuration policy to identify gaps.
C) Inspect registry entries for recently executed files.
D) Review audit logs for privilege escalation events.
Correct Answer:
Verified
Q81: Q82: Refer to the exhibit. A security analyst Q83: A European-based advertisement company collects tracking information Q84: A SIEM tool fires an alert about Q85: An engineer is going through vulnerability triage Q87: The incident response team receives information about Unlock this Answer For Free Now! View this answer and more for free by performing one of the following actions Scan the QR code to install the App and get 2 free unlocks Unlock quizzes for free by uploading documents