
Ultimate access to all questions.
Your organization, which operates in a highly regulated industry, is using Microsoft 365 and has identified a potential security threat involving phishing attempts targeting sensitive customer data. The organization must comply with strict data protection regulations. What comprehensive steps should you take to investigate and mitigate the threat effectively, ensuring compliance and minimal disruption to operations? (Choose the best single option)
A
Immediately isolate all affected systems and restrict access to sensitive data without prior analysis, to prevent any potential data breach.
B
Use Microsoft 365 security tools, such as Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, to identify and analyze the threat, then collaborate with legal and compliance teams to ensure any response aligns with regulatory requirements.
C
Deploy security patches or updates across all systems without assessing the threat's scope, to ensure all potential vulnerabilities are addressed.
D
Monitor the situation without taking immediate action, to gather more information about the threat's origin and method of operation.
E
All of the above.