Multiple Choice
A security team receives reports of multiple files causing suspicious activity on users' workstations. The file attempted to access highly confidential information in a centralized file server. Which two actions should be taken by a security analyst to evaluate the file in a sandbox? (Choose two.)
A) Inspect registry entries
B) Inspect processes.
C) Inspect file hash.
D) Inspect file type.
E) Inspect PE header.
Correct Answer:
Verified
Related Questions
Q10: Q11: Q12: Q13: Which tool conducts memory analysis? Q14: Which technique is used to evade detection
A) MemDump
B) Sysinternals