Joe a website administrator believes he owns the intellectual property for a company invention and has been replacing image files on the company's public facing website in the DMZ. Joe is using steganography to hide stolen data.Which of the following controls can be implemented to mitigate this type of inside threat?

A. Digital signatures
B. File integrity monitoring
C. Access controls
D. Change management
E. Stateful inspection firewall


Answer: B. File integrity monitoring

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT shown when you look at your files in Details view?

A) File image B) File name C) File size D) File type

Computer Science & Information Technology

Use the ________ Wizard with Access to create a direct link between the table or query and the Word document

Fill in the blank(s) with correct word

Computer Science & Information Technology

Make sure you try your pages in several major browsers to make sure they work properly.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What does the Windows Firewall do??

A. ?It protects your computer from unauthorized users. B. ?It allows viruses in through a backdoor on your computer. C. ?It creates worms on your computer. D. ?It acts on your behalf when prompted for a password.

Computer Science & Information Technology