Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
ion they can compromise. You know that a workstation can be used as a pivot point to gain access to more sensitive systems. Which of the following is the most important aspect of maintaining network security against this type of attack? A. Network segmentation.B. Identifying a network baseline.C. Documenting all network assets in your organization.D. Identifying inherent vulnerabilities.E. User education and training.
In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.
"Waterfall" is the correct answer for the above question.
Explanation:
The Waterfall model is a model which is the first model recognized by some scientists is used to states some rules to develop the software. It is based on the phases of the SDLC. The SDLC is the collection of phase that is used in software development.
The waterfall model moves like water moves. It means any next phase starts if the previous phase is completed and the user can not move into previous steps of the model.
This is also asked by the question. Hence the answer is the waterfall model.