Posted by: Pdfprep
Post Date: March 3, 2021
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence.
The information gained from the phishing attack was a result of users visiting known malicious websites.
What must be done in order to prevent this from happening in the future?
A . Modify an access policy
B . Modify identification profiles
C . Modify outbound malware scanning policies
D . Modify web proxy settings
Answer: D
Leave a Reply