Q: 6
An analyst is responding to a critical incident involving a potential ransomware attack. The analyst
immediately initiates full isolation on the compromised endpoint using Cortex XSIAM to prevent the
malware from spreading across the network. However, the analyst now needs to collect additional
forensic evidence from the isolated machine, including memory dumps and disk images without
reconnecting it to the network. Which action will allow the analyst to collect the required forensic
evidence while ensuring the endpoint remains fully isolated?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.