Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?
r3vrnd
6 months agoThranduil1789
6 months, 1 week agoGK2205
9 months, 3 weeks agoLoveBug4
10 months, 2 weeks agoBas375
1 year agoLordXander
1 year, 1 month agoDruSuperman
1 year, 2 months agoduke_of_kamulu
1 year, 1 month agoqtygbapjpesdayazko
1 year, 1 month agoanarchyeagle
1 year, 2 months agocalx5
1 year, 2 months agoLalo
1 year, 1 month agoprzemyslaw1
1 year, 2 months agoryotan
1 year, 2 months agoLalo
1 year, 1 month agoathicalacker
1 year, 2 months agoMabrow
1 year, 2 months agoinsaniunt
1 year, 2 months agopechuga
1 year, 3 months ago