List of questions
Related questions
Question 532 - 312-50v12 discussion
Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?
A.
Instant Messenger Applications; verifying the sender's identity before opening any files
B.
Insecure Patch Management; updating application software regularly
C.
Rogue/Decoy Applications; ensuring software is labeled as TRUSTED
D.
Portable Hardware Media/Removable Devices; disabling Autorun functionality
Your answer:
0 comments
Sorted by
Leave a comment first