Preventing Malicious Attacks on Corporate Networks | Best Practices | CompTIA A+ Core 2

Best Practices for Preventing Malicious Attacks on Corporate Networks

Question

A corporate network was recently infected by a malicious application on a flash drive that downloaded sensitive company files and injected a virus, which spread onto the network.

Which of the following best practices could have prevented the attack?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

C.

The best practice that could have prevented the attack is disabling AutoRun (Option C).

AutoRun is a feature in Windows that automatically runs a program when a removable device is inserted into a computer. This means that if a flash drive infected with malware is inserted into a computer with AutoRun enabled, the malware will automatically execute and infect the computer.

Disabling AutoRun can prevent this from happening. By disabling AutoRun, the user will have to manually run the program on the removable device, which gives them a chance to scan it for viruses before running any files.

Implementing strong passwords (Option A), changing default credentials (Option B), removing the Guest account (Option D), and encrypting data (Option E) are all important security measures. However, in this scenario, they would not have prevented the attack.

Strong passwords and changing default credentials can prevent unauthorized access to the network, but they would not have prevented the malware from infecting the network through the flash drive. Removing the Guest account is also a good security practice, but it would not have prevented the attack.

Encrypting data can protect sensitive information from unauthorized access if it is stolen, but it would not have prevented the malware from infecting the network through the flash drive.

In summary, disabling AutoRun is the best practice that could have prevented the attack.