Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?
Bas375
2 weeks, 1 day agoLordXander
3 weeks, 6 days agoDruSuperman
1 month, 3 weeks agoduke_of_kamulu
1 month, 1 week agoqtygbapjpesdayazko
1 month, 2 weeks agoanarchyeagle
2 months agocalx5
2 months, 1 week agoLalo
1 month, 1 week agoprzemyslaw1
2 months, 1 week agoryotan
2 months, 1 week agoLalo
1 month, 1 week agoathicalacker
2 months, 1 week agoMabrow
2 months agoinsaniunt
2 months, 2 weeks agopechuga
2 months, 3 weeks ago