Related questions
Question 256 - IIA-CIA-Part3 discussion
A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
A.
Monitoring network traffic.
B.
Using whitelists and blacklists to manage network traffic.
C.
Restricting access and blocking unauthorized access to the network
D.
Educating employees throughout the company to recognize phishing attacks.
Your answer:
0 comments
Sorted by
Leave a comment first