Sarah, a system administrator, was alerted of potential malicious activity on the network of her company. She discovered a malicious program spread through the instant messenger application used by her team. The attacker had obtained access to one of her teammate's messenger accounts and started sending files across the contact list. Which best describes the attack scenario and what measure could have prevented it?
r3vrnd
4 months, 3 weeks agoThranduil1789
5 months, 1 week agoGK2205
8 months, 2 weeks agoLoveBug4
9 months, 1 week agoBas375
11 months, 3 weeks agoLordXander
1 year agoDruSuperman
1 year agoduke_of_kamulu
1 year agoqtygbapjpesdayazko
1 year agoanarchyeagle
1 year, 1 month agocalx5
1 year, 1 month agoLalo
1 year agoprzemyslaw1
1 year, 1 month agoryotan
1 year, 1 month agoLalo
1 year agoathicalacker
1 year, 1 month agoMabrow
1 year, 1 month agoinsaniunt
1 year, 1 month agopechuga
1 year, 1 month ago