A security analyst is preparing to analyze a potentially malicious program believed to have in ltrated an organization’s network. To ensure the safety and integrity of the production environment, the analyst decided to use a sheep dip computer for the analysis. Before initiating the analysis, what key step should the analyst take?

QuestionsCategory: 312-50v12A security analyst is preparing to analyze a potentially malicious program believed to have in ltrated an organization’s network. To ensure the safety and integrity of the production environment, the analyst decided to use a sheep dip computer for the analysis. Before initiating the analysis, what key step should the analyst take?
Admin Staff asked 1 year ago
A security analyst is preparing to analyze a potentially malicious program believed to have in ltrated an organization's network. To ensure the safety and integrity of the production environment, the analyst decided to use a sheep dip computer for the analysis. Before initiating the analysis, what key step should the analyst take?

A. Install the potentially malicious program on the sheep dip computer.

B. Store the potentially malicious program on an external medium, such as a CD-ROM.

C. Run the potentially malicious program on the sheep dip computer to determine its behavior.

D. Connect the sheep dip computer to the organization's internal network.










Correct Answer: B

This question is in 312-50v12 exam
For getting CEH Certificate


Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.