Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CLO-002 Topic 6 Question 66 Discussion

Actual exam question for CompTIA's CLO-002 exam
Question #: 66
Topic #: 6
[All CLO-002 Questions]

An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Dannie
2 months ago
Audit and system logs? More like 'audit and phishing logs', amirite? Seriously though, that's the way to go.
upvoted 0 times
A) Audit and system logs
upvoted 0 times
...
Rocco
3 days ago
D) Standard operating procedures
upvoted 0 times
...
Anglea
6 days ago
C) Departmental policies
upvoted 0 times
...
Kassandra
10 days ago
B) Change management procedures
upvoted 0 times
...
Dino
29 days ago
A) Audit and system logs
upvoted 0 times
...
...
Sherita
2 months ago
Standard operating procedures? Maybe if we're trying to prevent future phishing attacks, but this is about investigating the current one. Gotta go with the logs, my dude.
upvoted 0 times
...
Hassie
2 months ago
Departmental policies? What, are we going to read through the company's 'How to Avoid Phishing' handbook? Nah, I'll pass on that one.
upvoted 0 times
...
Christene
2 months ago
Change management procedures? Really? That's not going to help with an email phishing investigation. I'm going with option A.
upvoted 0 times
...
Tyra
2 months ago
I think departmental policies could also be useful in understanding how the email server is supposed to be protected.
upvoted 0 times
...
Talia
2 months ago
I agree with Ludivina, audit and system logs can provide valuable information about the phishing campaign.
upvoted 0 times
...
Ludivina
2 months ago
I think the best resource to start the investigation is audit and system logs.
upvoted 0 times
...
Marjory
2 months ago
Audit and system logs seem like the obvious choice here. All the evidence we need is right there in the logs.
upvoted 0 times
Roselle
17 days ago
I agree, the logs will have all the information we need to track the phishing campaign.
upvoted 0 times
...
Marva
18 days ago
Audit and system logs are definitely the best resource to start the investigation.
upvoted 0 times
...
Lajuana
19 days ago
D) Standard operating procedures
upvoted 0 times
...
Carissa
19 days ago
I think we should also consider the standard operating procedures to ensure we follow the correct protocols during the investigation.
upvoted 0 times
...
Gianna
25 days ago
C) Departmental policies
upvoted 0 times
...
Josephine
1 months ago
B) Change management procedures
upvoted 0 times
...
Carisa
1 months ago
D) Standard operating procedures
upvoted 0 times
...
Kris
1 months ago
I agree, the audit and system logs will provide us with valuable information to start the investigation.
upvoted 0 times
...
Leeann
1 months ago
A) Audit and system logs
upvoted 0 times
...
Tracie
1 months ago
A) Audit and system logs
upvoted 0 times
...
...
Lonny
2 months ago
I think departmental policies could also be useful in guiding the investigation process.
upvoted 0 times
...
Stefany
2 months ago
I agree with Emiko. Audit and system logs can provide valuable information about the email phishing campaign.
upvoted 0 times
...
Emiko
2 months ago
I think the best resource to start the investigation would be audit and system logs.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77