A company's employees were victims of a spear phishing campaign impersonating the CEO. The company would now like to implement a solution to improve the overall security posture by assuring their employees that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal?

A. Spam filter
B. Digital signatures
C. Antivirus software
D. Digital certificates


Answer: B. Digital signatures

Computer Science & Information Technology

You might also like to view...

The space between each letter can be changed using _____.

A. spacing B. kerning C. font size D. intervaling

Computer Science & Information Technology

Task is a _______ class.

a. anonymous inner b. composite c. nested d. generic

Computer Science & Information Technology

Which of the following features in the Filter Gallery allows you to see more of the image?

a. Pull Back b. View More c. Enlarge View d. Zoom Out

Computer Science & Information Technology

A pie chart should be used when you need to show the relationship of each part to a whole.

a. true b. false

Computer Science & Information Technology