nerdexam
CiscoCisco

300-215 · Question #102

300-215 Question #102: Real Exam Question with Answer & Explanation

Sign in or unlock 300-215 to reveal the answer and full explanation for question #102. The question stem and answer options stay visible for context.

Submitted by ricky.ec· Mar 6, 2026Incident Response Techniques

Question

An attacker embedded a macro within a word processing file opened by a user in an organization's legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)

Options

  • Acontrolled folder access
  • Bremovable device restrictions
  • Csigned macro requirements
  • Dfirewall rules creation
  • Enetwork access control

Unlock 300-215 to see the answer

You've previewed enough free 300-215 questions. Unlock 300-215 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#macro security#malware mitigation#endpoint security#access control
Full 300-215 PracticeBrowse All 300-215 Questions