A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http:///a.php in a phishing email. To prevent other computers from being infected by the same malware variation, the analyst should create a rule on the:

A. email server that automatically deletes attached executables.
B. IDS to match the malware sample.
C. proxy to block all connections to
D. firewall to block connection attempts to dynamic DNS hosts.

Answer: C. proxy to block all connections to

Computer Science & Information Technology

You might also like to view...

When you want to specify criteria in multiple fields, and at least one of the criteria must be true for a record to be included in the results, then the ________ logical operator is used

A) OR B) BETWEEN C) NOT D) AND

Computer Science & Information Technology

Kathleen is implementing an access control system for her organization and builds the following array: Reviewers: update files, delete files Submitters: upload files Editors: upload files, update files Archivists: delete files What type of access control system has Kathleen implemented?

A. Role-based access control B. Task-based access control C. Rule-based access control D. Discretionary access control

Computer Science & Information Technology