Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 3 Question 57 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 57
Topic #: 3
[All 350-201 Questions]

A security engineer discovers that a spreadsheet containing confidential information for nine of their employees was fraudulently posted on a competitor's website. The spreadsheet contains names, salaries, and social security numbers. What is the next step the engineer should take in this investigation?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Noemi
1 months ago
I'm leaning towards option D, but I'd also want to check the incoming and outgoing communications just to be sure. Gotta cover all our bases, you know?
upvoted 0 times
...
Filiberto
1 months ago
Option A is crucial. We need to determine if there's any internal knowledge of the incident before we can take any further steps. Insider threat is a real concern in these cases.
upvoted 0 times
Delisa
9 days ago
Let's start by looking into who had access to the spreadsheet and if anyone may have shared it externally.
upvoted 0 times
...
Ahmad
16 days ago
Agreed, it's important to investigate any potential insider threats first.
upvoted 0 times
...
Karima
20 days ago
Yes, we need to find out if someone within our organization leaked the information.
upvoted 0 times
...
...
Jarvis
2 months ago
Haha, option C is a bit overkill, don't you think? Disconnecting the network might be a bit extreme, especially when we need to keep the business running.
upvoted 0 times
Annice
11 days ago
A: That's a good idea. Let's gather more information before taking any drastic measures.
upvoted 0 times
...
Major
24 days ago
B: Maybe we should start by checking for internal knowledge of the incident, like option A suggests.
upvoted 0 times
...
Vivan
1 months ago
A: I agree, option C does seem extreme. We need to find a balance between security and keeping the business running smoothly.
upvoted 0 times
...
...
Mitsue
2 months ago
I'd go with option B. Checking the communications to identify any spoofed emails could help us understand how the information was leaked in the first place.
upvoted 0 times
Celestine
2 days ago
User 3: We need to act fast and prevent any further leaks.
upvoted 0 times
...
Kristal
6 days ago
User 2: Agreed, that could help us figure out how the information got leaked.
upvoted 0 times
...
Sarina
7 days ago
User 1: I think we should go with option B and check the communications for spoofed emails.
upvoted 0 times
...
Frederick
10 days ago
User 4: Agreed, let's focus on option B for now.
upvoted 0 times
...
Vesta
13 days ago
User 3: We should definitely investigate any spoofed emails to get to the bottom of this.
upvoted 0 times
...
Cheryl
17 days ago
User 2: Good idea, that could help us figure out how the information got leaked.
upvoted 0 times
...
Keith
2 months ago
User 1: Let's check incoming and outgoing communications to identify spoofed emails.
upvoted 0 times
...
...
Maddie
2 months ago
Definitely option D. We need to take legal action against the competitor to protect our employees' sensitive information. This is a serious breach of privacy and confidentiality.
upvoted 0 times
...
Terrilyn
2 months ago
I think we should disconnect the network to prevent further damage.
upvoted 0 times
...
Alaine
3 months ago
We need to figure out how this happened and stop it from spreading.
upvoted 0 times
...
Lizbeth
3 months ago
I can't believe our confidential information was leaked!
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77