A system security analyst using an enterprise monitoring tool notices an unknown internal host exfiltrating files to several foreign IP addresses. Which of the following would be an appropriate mitigation technique?
A. Disabling unnecessary accounts
B. Rogue machine detection
C. Encrypting sensitive files
D. Implementing antivirus
Answer: B. Rogue machine detection
You might also like to view...
A stack is a __________ data structure.
a. FILO. b. FOLI. c. LOFI. d. LIFO.
Postorder traversal of a binary tree
A) first visits the root, then recursively traverses the left and right subtree B) recursively traverses the left subtree, then visits the root, then traverses the right subtree C) recursively traverses the left subtree, then traverses the right subtree, then visits the root D) visits all the nodes according to their natural order
All of the following are types of e-commerce business EXCEPT ________
A) C2C B) B2C C) B2B D) C2B
A(n) ________ displays data from an underlying table, query, or SQL statement as specified in the report's Record Source property
A) main report B) bound report C) unbound report D) subreport