ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 256 - IIA-CIA-Part3 discussion

Report
Export

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?

A.
Monitoring network traffic.
Answers
A.
Monitoring network traffic.
B.
Using whitelists and blacklists to manage network traffic.
Answers
B.
Using whitelists and blacklists to manage network traffic.
C.
Restricting access and blocking unauthorized access to the network
Answers
C.
Restricting access and blocking unauthorized access to the network
D.
Educating employees throughout the company to recognize phishing attacks.
Answers
D.
Educating employees throughout the company to recognize phishing attacks.
Suggested answer: D
asked 18/09/2024
Antonio Carlos Figueiredo Junior
50 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first