A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the following describes what occurred?
A. The user’s account was over-privileged.
B. Improper error handling triggered a false negative in all three controls.
C. The email originated from a private email server with no malware protection.
D. The virus was a zero-day attack.
Answer: D. The virus was a zero-day attack.
You might also like to view...
Application options are sometimes called preferences.
Answer the following statement true (T) or false (F)
There are four different password-based methods of authentication, which one is preferred?
A. MS-CHAP B. MS-CHAP v2 C. CHAP D. PAP
________ applications divide functionality into separate tiers.
a) n-tier b) Multi-tier c) Both a and b. d) None of the above.
When the mouse pointer points to an icon, which of the following displays and provides information about the icon?
A) Notification area B) Taskbar C) ScreenTip D) Shortcut menu