Joe a website administrator believes he owns the intellectual property for a company invention and has been replacing image files on the company's public facing website in the DMZ. Joe is using steganography to hide stolen data.Which of the following controls can be implemented to mitigate this type of inside threat?
A. Digital signatures
B. File integrity monitoring
C. Access controls
D. Change management
E. Stateful inspection firewall
Answer: B. File integrity monitoring
You might also like to view...
Which of the following is NOT shown when you look at your files in Details view?
A) File image B) File name C) File size D) File type
Use the ________ Wizard with Access to create a direct link between the table or query and the Word document
Fill in the blank(s) with correct word
Make sure you try your pages in several major browsers to make sure they work properly.
Answer the following statement true (T) or false (F)
What does the Windows Firewall do??
A. ?It protects your computer from unauthorized users. B. ?It allows viruses in through a backdoor on your computer. C. ?It creates worms on your computer. D. ?It acts on your behalf when prompted for a password.