Cisco 300-215 Question Answer
An attacker embedded a macro within a word processing file opened by a user in an organization’s legal department. The attacker used this technique to gain access to confidential financial data. Which two recommendations should a security expert make to mitigate this type of attack? (Choose two.)
Cisco 300-215 Summary
- Vendor: Cisco
- Product: 300-215
- Update on: Mar 25, 2026
- Questions: 131

