An attacker embedded a macro within a word processing file opened by a user in an organization's legal department. The attacker used this technique to gain access to confidential financial dat
a. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)
Clement
1 months agoDestiny
6 days agoDonte
12 days agoMarkus
13 days agoElliott
1 months agoJustine
1 months agoClorinda
1 days agoKati
13 days agoJudy
1 months agoKarima
2 months agoErinn
6 days agoAlesia
24 days agoRuby
1 months agoBrett
2 months agoKristin
2 months agoDerrick
3 months ago