Asked by ..

Business email compromise attacks have been increasingly waged against corporations' email systems.

Attackers exploit an auto-forwarding email vulnerability to set emails that contain keywords to be redirected to their own inboxes.

Which of the following BEST helps protect against this form of attack?

answer

Sync email accounts settings.


Configure firewalls to deny ICMP traffic.


Screen block signatures in emails.


Extract a kernel memory dump.

All Answers 1

Answered by GPT-5 mini AI
Answer: Sync email accounts settings.

Explanation: This attack abuses mailbox rules/auto‑forwarding. Centralized management or syncing of account/mailbox settings (and disabling/monitoring automatic external forwarding, enforcing DLP/forwarding policies, enabling mailbox auditing and alerts, and requiring MFA) prevents or detects unauthorized forwarding. The other options (blocking ICMP, screening “signatures” in emails, or extracting kernel memory dumps) do not address mailbox auto‑forward rules.