An incident response team requires documentation for an email phishing campaign against a company's email server. Which of the following is the BEST resource to use to start the investigation?
Correct Answer: A. Audit and system logs
Audit and system logs are the best resource to start an investigation into an email phishing campaign. These logs contain records of events related to system activity, such as login attempts, email traffic, and any suspicious activities. By analyzing audit and system logs, the incident response team can trace the origin and impact of the phishing campaign, identify compromised accounts, and assess the scope of the attack.
Why the Other Options Are Incorrect:
Change management procedures document the process for making changes to IT systems and infrastructure. While important for tracking system modifications, these documents are unlikely to provide direct insight into an email phishing attack, which is more related to monitoring and auditing system behavior.
Departmental policies define the rules and procedures for employees within a specific department. While these policies may include guidelines for reporting phishing incidents or handling email security, they are not a primary resource for investigating the technical details of a phishing campaign.
Standard operating procedures (SOPs) outline routine processes and protocols for various tasks within an organization. While SOPs can provide a framework for responding to incidents, they do not offer the specific, real-time data required to investigate a phishing campaign.
No Payment Cards Needed
Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.
You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams