An employee in the finance department received an email with a spreadsheet attachment claiming to contain urgent budget corrections required by their manager. However, the spreadsheet is actually a file-based threat designed to compromise the user's system. What is the BEST action the employee should take to mitigate this threat?
Report the email to the organization's security team for analysis before any further action is taken.
Forward the email to their manager to confirm its authenticity before opening the attachment.
Ignore the email and the attachment because it might be spam, and then delete it.
Open the attachment to verify its content, then proceed with the tasks if it seems legitimate.
By reporting the suspicious email to the organization’s security team, the employee is following the proper protocol for dealing with potential file-based threats. This allows the security team to investigate and respond to the threat effectively, possibly preventing a security breach. Opening or ignoring the attachment could lead to system compromise, and contacting the manager directly may not stop the potential threat in time if the file is indeed malicious.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a file-based threat?
Open an interactive chat with Bash
What does reporting an email to a security team involve?