A company's employees were victims of a spear phishing campaign impersonating the CEO. The company would now like to implement a solution to improve the overall security posture by assuring their employees that email originated from the CEO. Which of the following controls could they implement to BEST meet this goal?
A. Spam filter
B. Digital signatures
C. Antivirus software
D. Digital certificates
Answer: B. Digital signatures
Computer Science & Information Technology
You might also like to view...
The space between each letter can be changed using _____.
A. spacing B. kerning C. font size D. intervaling
Computer Science & Information Technology
Task is a _______ class.
a. anonymous inner b. composite c. nested d. generic
Computer Science & Information Technology
Which of the following features in the Filter Gallery allows you to see more of the image?
a. Pull Back b. View More c. Enlarge View d. Zoom Out
Computer Science & Information Technology
A pie chart should be used when you need to show the relationship of each part to a whole.
a. true b. false
Computer Science & Information Technology