The Chief Executive Officer (CEO) of a large insurance company has reported phishing emails that contain malicious links are targeting the entire organization. Which of the following actions would work BEST to prevent against this type of attack?

A. Turn on full behavioral analysis to avert an infection.
B. Implement an EDR mail module that will rewrite and analyze email links.
C. Reconfigure the EDR solution to perform real-time scanning of all files.
D. Ensure EDR signatures are updated every day to avert infection.
E. Modify the EDR solution to use heuristic analysis techniques for malware.


Answer: B. Implement an EDR mail module that will rewrite and analyze email links.

Computer Science & Information Technology

You might also like to view...

The ____ amended U.S. copyright law so that the definition of the term "financial gain" includes receiving copyrighted works for free.

A. Digital Millennium Copyright Act B. NET Act C. Fair Use Act D. Anti-Plagiarism Act

Computer Science & Information Technology

The token frame M-bit is the monitor bit that is used by the active monitor station to ____________________ continuous circulation of a frame in the ring.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If your computer is equipped with a TPM, you can enable BitLocker without first accessing Group Policy. You receive a BitLocker Drive Encryption window with three options. Which of these is not one of those options?

a. Require a smart card b. Require a PIN at every startup c. Require a Startup key at every startup d. Use BitLocker without additional keys

Computer Science & Information Technology

?In order for computers to share resources efficiently, they can be linked together in a structure called network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology