AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: After a recent phishing attack, you decide to gcp video

Question 1
« Back   Next gcp workspace-administrator Exam Question »

Full Certification Question

After a recent phishing attack, you decide to investigate whether custom configurations contributed to the breach. One particular concern is that some users clicked on links from emails that bypassed your existing security measures. What should be your first step in investigating whether custom configurations allowed this email to bypass security measures?