A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the following describes what occurred?

A. The user’s account was over-privileged.
B. Improper error handling triggered a false negative in all three controls.
C. The email originated from a private email server with no malware protection.
D. The virus was a zero-day attack.


Answer: D. The virus was a zero-day attack.

Computer Science & Information Technology

You might also like to view...

Application options are sometimes called preferences.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

There are four different password-based methods of authentication, which one is preferred?

A. MS-CHAP B. MS-CHAP v2 C. CHAP D. PAP

Computer Science & Information Technology

________ applications divide functionality into separate tiers.

a) n-tier b) Multi-tier c) Both a and b. d) None of the above.

Computer Science & Information Technology

When the mouse pointer points to an icon, which of the following displays and provides information about the icon?

A) Notification area B) Taskbar C) ScreenTip D) Shortcut menu

Computer Science & Information Technology