A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet. When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book.
Which of the following controls would be most effective to prevent such an attack?
Which of the following network types should an organization choose if it wants to allow access only to its own personnel?
According to the International Professional Practices Framework, internal auditors who are assessing the adequacy of organizational risk management processes should not:
Senior management has decided to implement the Three Lines of Defense model for risk management. Which of the following best describes senior management's duties with regard to this model?