Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-215 Topic 10 Question 90 Discussion

Actual exam question for Cisco's 300-215 exam
Question #: 90
Topic #: 10
[All 300-215 Questions]

An attacker embedded a macro within a word processing file opened by a user in an organization's legal department. The attacker used this technique to gain access to confidential financial dat

a. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Clement
1 months ago
Ah, the age-old battle between security and convenience. Might as well just unplug the whole organization and call it a day.
upvoted 0 times
Destiny
6 days ago
C: It's always a balance between security and convenience.
upvoted 0 times
...
Donte
12 days ago
B: Agreed, those would definitely help prevent this type of attack.
upvoted 0 times
...
Markus
13 days ago
A: controlled folder access and signed macro requirements.
upvoted 0 times
...
...
Elliott
1 months ago
Signed macro requirements? Isn't that just a fancy way of saying, 'No more fun macros for you'? I bet the legal department is gonna love that one.
upvoted 0 times
...
Justine
1 months ago
Firewall rules creation? Really? That's like putting a Band-Aid on a bullet wound. C'mon, security experts, give us something a little more practical.
upvoted 0 times
Clorinda
1 days ago
B: Yeah, we need more advanced solutions to prevent these types of attacks.
upvoted 0 times
...
Kati
13 days ago
A: I agree, firewall rules creation seems like a basic measure.
upvoted 0 times
...
...
Judy
1 months ago
Controlled folder access and signed macro requirements? Sounds like a security nerd's dream come true. I bet the legal department is just thrilled about that.
upvoted 0 times
...
Karima
2 months ago
Signed macro requirements is definitely the way to go. Gotta keep those macros in check, you know? And removable device restrictions - can't have those pesky flash drives spreading malware around.
upvoted 0 times
Erinn
6 days ago
Agreed, those two recommendations can really help prevent attacks like this from happening again.
upvoted 0 times
...
Alesia
24 days ago
Removable device restrictions are crucial. We need to control what devices can be connected.
upvoted 0 times
...
Ruby
1 months ago
Signed macro requirements is a must. We can't risk unauthorized macros running.
upvoted 0 times
...
...
Brett
2 months ago
Firewall rules creation could also help prevent such attacks.
upvoted 0 times
...
Kristin
2 months ago
I agree, we should also enforce signed macro requirements.
upvoted 0 times
...
Derrick
3 months ago
We need to implement controlled folder access.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77