Employees receive an email from an executive within the organization that summarizes a recent security breach and requests that employees verify their credentials through a provided link. Several employees report the email as suspicious, and a security analyst is investigating the reports. Which two steps should the analyst take to begin this investigation? (Choose two.)
DrVoIP
9 months, 3 weeks agojaciro11
1 year, 3 months agogermx
1 year, 11 months ago