Valid 300-215 Dumps shared by ExamDiscuss.com for Helping Passing 300-215 Exam! ExamDiscuss.com now offer the newest 300-215 exam dumps, the ExamDiscuss.com 300-215 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 300-215 dumps with Test Engine here:
A threat intelligence report identifies an outbreak of a new ransomware strain spreading via phishing emails that contain malicious URLs. A compromised cloud service provider, XYZCloud, is managing the SMTP servers that are sending the phishing emails. A security analyst reviews the potential phishing emails and identifies that the email is coming from XYZCloud. The user has not clicked the embedded malicious URL. What is the next step that the security analyst should take to identify risk to the organization?
Correct Answer: D
Since the phishing email originates from a known compromised cloud provider (XYZCloud), the correct immediate action for the security analyst is to determine the broader scope of exposure. This involves checking whether other users in the organization received similar emails from the same potentially malicious source. Therefore, querying for emails from theIP address rangesorSMTP domainslinked to XYZCloud is essential for identifying other possible attack vectors. This step aligns with the containment phase of the incident response lifecycle, as outlined in theCyberOps Technologies (CBRFIR) 300-215 study guide, where threat hunting and log analysis are used to determine the extent of compromise and prevent lateral movement or further exposure. Only after the scope is understood should remediation or reporting actions follow. Reference:CyberOps Technologies (CBRFIR) 300-215 study guide, Chapter: Email-Based Threats and Containment Strategy during Incident Response.