A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled `Invoice RE: 0004489`. The hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise? A. Run and analyze the DLP Incident Summary Report from the Email Security Appliance B. Ask the company to execute the payload for real time analysis C. Investigate further in open source repositories using YARA to find matches D. Obtain a copy of the file for detonation in a sandbox  Suggested Answer: D This question is in 350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR) Exam For getting Cisco Certified CyberOps Professional Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Cisco. Trademarks, certification & product names are used for reference only and belong to Cisco. The website does not contain actual questions and answers from Cisco's Certification Exam.
Please login or Register to submit your answer