An attacker embedded a macro within a word processing file opened by a user in an organization's legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)
A) controlled folder access
B) removable device restrictions
C) signed macro requirements
D) firewall rules creation
E) network access control
Correct Answer:
Verified
Q1: An engineer received a call to assist
Q2: What is the function of a disassembler?
A)
Q3: An "unknown error code" is appearing on
Q4: Which information is provided bout the object
Q6: Q7: A security team received an alert of Q8: Which scripts will search a log file Q9: A security team is discussing lessons learned Q10: Q11: Unlock this Answer For Free Now! View this answer and more for free by performing one of the following actions Scan the QR code to install the App and get 2 free unlocks Unlock quizzes for free by uploading documents