When conducting a security incident investigation, which statement is true?
- The Tier 1 SOC analyst should perform an in-depth malware file analysis, using tools such as VirusTotal and Malwr.com.
- Slowly and methodically investigate and document every alert, including false positives, until the next alert arrives in the queue.
- Spend more time in investigating the false positive events to help prevent future attacks.
- Approach every investigation with an open-mind, reserving judgment until discovering definitive evidence of the presence of either a false or true positive event.
- Quickly disregard the true positive events, as these will require more time for the analysts to investigate.
Explanation & Hint:
When conducting a security incident investigation, the statement that holds true is: “Approach every investigation with an open-mind, reserving judgment until discovering definitive evidence of the presence of either a false or true positive event.” This approach is crucial for a few reasons:
The other statements are generally not recommended practices in security incident investigations:
|