The security team for your organization is concerned about phishing attacks against your end user base. What two actions should you take to configure the strongest possible preventative measure against phishing attacks? (Choose two.)
A.
Train end users to mark messages as spam when they see something suspicious.
B.
Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.
C.
Configure spoofing and authentication controls to quarantine messages that are perceived as threats.
D.
Enforce confidential mode for all messages sent and received from your Workspace domain.
E.
Force encryption on all inbound and outbound emails from your Workspace domain.
Vote BC.
A: No. End users won't 100% follow what Workspace admin instructions even they trained.
D: No. Confidential mode is intended for internal use. The users still need to receive emails from outside domain, such as sales shall receive customer emails.
E: No. Force encryption inbound outbound doesn't help. Phishing attacks still happen.
Google emails are already encrypted
"Gmail messages are encrypted at rest and while in transit between data centers1.
Messages transiting to third-party providers are encrypted with Transport Layer Security when possible or required by configuration1
B. Configure spoofing and authentication controls to warn end users about messages that are perceived as threats.
C. Configure spoofing and authentication controls to quarantine messages that are perceived as threats.
B. Configuring spoofing and authentication controls to warn end users about messages that are perceived as threats can help raise awareness among end users and prompt them to exercise caution when encountering suspicious emails. This warning can include banners or visual indicators that notify users about potential phishing attempts, enabling them to be more vigilant while reviewing emails.
C. Configuring spoofing and authentication controls to quarantine messages that are perceived as threats can provide an additional layer of protection. By quarantining suspicious messages, the security team can closely analyze them and determine if they are indeed phishing attempts before releasing them to end users' inboxes. This helps prevent potentially harmful messages from reaching end users until they are verified to be safe.
Options A, D, and E do not directly address phishing prevention
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
klu23
Highly Voted 1 year, 3 months agozanhsieh
Highly Voted 1 year, 1 month agodija123
Most Recent 4 months, 4 weeks agoqtDirk
5 months, 2 weeks agodjdjdueufffs
9 months, 1 week agovirat_kohli
12 months agojcloud965
1 year agoChizTheWhiz
1 year agodija123
1 year ago2shyshy
1 year agobobsmith69
1 year, 2 months ago[Removed]
1 year, 2 months agoJane1234YIP
1 year, 3 months agodanaracena
1 year, 3 months agoProsecute
1 year, 3 months ago