Multiple Choice
A threat actor has crafted and sent a spear-phishing email with what appears to be a trustworthy link to the site of a conference that an employee recently attended. The employee clicked the link and was redirected to a malicious site through which the employee downloaded a PDF attachment infected with ransomware. The employee opened the attachment, which exploited vulnerabilities on the desktop. The ransomware is now installed and is calling back to its command and control server. Which security solution is needed at this stage to mitigate the attack?
A) web security solution
B) email security solution
C) endpoint security solution
D) network security solution
Correct Answer:

Verified
Correct Answer:
Verified
Q72: A European-based advertisement company collects tracking information
Q73: A SOC engineer discovers that the organization
Q74: A cloud engineer needs a solution to
Q75: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q76: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q78: An organization suffered a security breach in
Q79: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q80: Refer to the exhibit. A security analyst
Q81: How does Wireshark decrypt TLS network traffic?<br>A)
Q82: A security engineer discovers that a spreadsheet