An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious. What is the next step an engineer should take?
B is the way to go. Why waste time analyzing it when you can just upload it to a virus checker and get the answer right away? Though I'm kind of curious to see what kind of crazy script is in there...
Option C seems like the safest bet. Quarantining the file within the antivirus solution is the prudent approach, especially since it could be ransomware.
I think option D is the best choice. Analyzing the file in a sandbox environment will allow us to observe its behavior and determine if it's malicious without risking any damage to the system.
Tamekia
2 months agoRasheeda
15 days agoJohnetta
1 months agoSerina
1 months agoDeeanna
2 months agoSage
21 days agoGeorgeanna
1 months agoAudry
1 months agoKeneth
2 months agoRaina
2 days agoMalcolm
14 days agoNieves
1 months agoJarvis
1 months agoEvangelina
2 months agoAilene
2 months agoArletta
2 months agoSylvia
2 months agoLera
2 months agoChan
2 months agoColene
2 months agoJessenia
2 months agoGianna
2 months agoDorinda
3 months agoKattie
3 months agoDorinda
3 months ago