サイバー攻撃のライフサイクルのどの段階で、スピアフィッシングリンク、未知の電子メール、および危険なWebサイトについてユーザーに継続的な教育を提供することが重要になりますか?
正解:B
Weaponization and Delivery: Attackers will then determine which methods to use in order to deliver malicious payloads. Some of the methods they might utilize are automated tools, such as exploit kits, spear phishing attacks with malicious links, or attachments and malvertizing.
* Gain full visibility into all traffic, including SSL, and block high-risk applications. Extend those protections to remote and mobile devices.
* Protect against perimeter breaches by blocking malicious or risky websites through URL filtering.
* Block known exploits, malware and inbound command-and-control communications using multiple threat prevention disciplines, including IPS, anti-malware, anti-CnC, DNS monitoring and sinkholing, and file and content blocking.
* Detect unknown malware and automatically deliver protections globally to thwart new attacks.
* Provide ongoing education to users on spear phishing links, unknown emails, risky websites, etc.
https://www.paloaltonetworks.com/cyberpedia/how-to-break-the-cyber-attack-lifecycle