An employee in the finance department received an email with a spreadsheet attachment claiming to contain urgent budget corrections required by their manager. However, the spreadsheet is actually a file-based threat designed to compromise the user's system. What is the BEST action the employee should take to mitigate this threat?
You selected this option
Ignore the email and the attachment because it might be spam, and then delete it.
You selected this option
Forward the email to their manager to confirm its authenticity before opening the attachment.
You selected this option
Open the attachment to verify its content, then proceed with the tasks if it seems legitimate.
You selected this option
Report the email to the organization's security team for analysis before any further action is taken.
By reporting the suspicious email to the organization’s security team, the employee is following the proper protocol for dealing with potential file-based threats. This allows the security team to investigate and respond to the threat effectively, possibly preventing a security breach. Opening or ignoring the attachment could lead to system compromise, and contacting the manager directly may not stop the potential threat in time if the file is indeed malicious.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a file-based threat?
Open an interactive chat with Bash
What does reporting an email to a security team involve?