CompTIA CySA+CS0-002 – Question052

As part of an intelligence feed, a security analyst receives a report from a third-party trusted source. Within the report are several domains and reputational information that suggest the company's employees may be targeted for a phishing campaign. Which of the following configuration changes would be the MOST appropriate for intelligence gathering?

A.
Update the whitelist.
B. Develop a malware signature.
C. Sinkhole the domains.
D. Update the blacklist.

Correct Answer: D