Which of the following guidelines users should follow before opening email attachments?

a. The attachment was expected.
b. It is from a known source.
c. It appears to be a legitimate business document.
d. All the above.


ANS: d

Computer Science & Information Technology

You might also like to view...

The EBK designates the technology forensics role as the "____" professional.

A. computer forensics B. digital forensics C. incident management D. security

Computer Science & Information Technology

If the user clicks the Cancel button, the Save File Dialog control's Show Dialog method returns the value ____________.

a. Result.False b. Dialog Result Cancel c. Dialog Result Abort d. Result.NULL

Computer Science & Information Technology

Such a mechanism necessarily trades execution time overhead against the reduced storage requirements for files. In what circumstances is this trade-off acceptable?

What will be an ideal response?

Computer Science & Information Technology

When you select a subform control, an orange border appears around the control and the ________ appears in the top-left corner

Fill in the blank(s) with correct word

Computer Science & Information Technology