CiscoCisco
300-215 · Question #102
300-215 Question #102: Real Exam Question with Answer & Explanation
Sign in or unlock 300-215 to reveal the answer and full explanation for question #102. The question stem and answer options stay visible for context.
Submitted by ricky.ec· Mar 6, 2026Incident Response Techniques
Question
An attacker embedded a macro within a word processing file opened by a user in an organization's legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)
Options
- Acontrolled folder access
- Bremovable device restrictions
- Csigned macro requirements
- Dfirewall rules creation
- Enetwork access control
Unlock 300-215 to see the answer
You've previewed enough free 300-215 questions. Unlock 300-215 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#macro security#malware mitigation#endpoint security#access control