Question: An attacker starts their attack by using open - source intelligence to identify a target. They then use a spear - phishing email with a
An attacker starts their attack by using opensource intelligence to identify a target. They then use a spearphishing email with a malicious link enticing the recipient to click on it The user is curious and visits the site, where they are prompted for a username and password. The user enters the credentials, which are promptly sent to the attacker, who uses them to gain access to the organization's network.
Which of the following could have prevented this attack?
A
Strict firewall rules
B
Strict spam filters
C
User education
D
Antivirus
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
