Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IIA Exam IIA-CIA-Part3 Topic 12 Question 75 Discussion

Actual exam question for IIA's IIA-CIA-Part3 exam
Question #: 75
Topic #: 12
[All IIA-CIA-Part3 Questions]

A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Teri
3 months ago
I dunno, but I'm just glad I don't work at that publishing company. Imagine all the spoilers that cybercriminal could've leaked!
upvoted 0 times
Vallie
1 months ago
C: Educating employees throughout the company to recognize phishing attacks.
upvoted 0 times
...
Teri
1 months ago
B: Using whitelists and blacklists to manage network traffic.
upvoted 0 times
...
Brynn
1 months ago
A: Monitoring network traffic.
upvoted 0 times
...
...
Jaime
3 months ago
Option B sounds good to me. Using whitelists and blacklists to manage network traffic could help block suspicious activity and prevent malware from getting in.
upvoted 0 times
Tresa
2 months ago
Educating employees to recognize phishing attacks is crucial too, so they don't inadvertently open malicious attachments.
upvoted 0 times
...
Maryanne
2 months ago
Monitoring network traffic could also help in detecting any unusual activity before it causes harm.
upvoted 0 times
...
Chaya
2 months ago
I agree, it's important to have a system in place to filter out potentially harmful content.
upvoted 0 times
...
Roselle
2 months ago
Option B sounds good to me. Using whitelists and blacklists to manage network traffic could help block suspicious activity and prevent malware from getting in.
upvoted 0 times
...
...
Markus
3 months ago
Haha, I bet the manager who opened that attachment is feeling pretty embarrassed right now. Definitely gotta go with option D - training employees to spot phishing is the way to go.
upvoted 0 times
...
Devorah
3 months ago
I'm not sure, but I feel like option C might be the most effective. Restricting access and blocking unauthorized access to the network could have prevented the cybercriminal from gaining access to the unpublished book.
upvoted 0 times
...
Vanda
3 months ago
But wouldn't monitoring network traffic also help in detecting and preventing such attacks?
upvoted 0 times
...
Louisa
3 months ago
I agree with Chandra. Employees need to be trained to spot suspicious emails.
upvoted 0 times
...
Chandra
3 months ago
I think educating employees to recognize phishing attacks would be the most effective control.
upvoted 0 times
...
Georgeanna
3 months ago
I think option D is the best answer. Educating employees to recognize phishing attacks is crucial in preventing such incidents. This would help them identify suspicious emails and attachments, even from 'trusted' sources.
upvoted 0 times
Antonio
2 months ago
D: Restricting access and blocking unauthorized access is important for overall network security.
upvoted 0 times
...
Johnetta
2 months ago
C: Using whitelists and blacklists can help manage network traffic more effectively.
upvoted 0 times
...
Margot
3 months ago
B: Monitoring network traffic could also help detect any suspicious activity.
upvoted 0 times
...
Shaunna
3 months ago
A: I agree, educating employees is key to preventing these types of attacks.
upvoted 0 times
...
...

Save Cancel