A system security analyst using an enterprise monitoring tool notices an unknown internal host exfiltrating files to several foreign IP addresses. Which of the following would be an appropriate mitigation technique?

A. Disabling unnecessary accounts
B. Rogue machine detection
C. Encrypting sensitive files
D. Implementing antivirus


Answer: B. Rogue machine detection

Computer Science & Information Technology

You might also like to view...

A stack is a __________ data structure.

a. FILO. b. FOLI. c. LOFI. d. LIFO.

Computer Science & Information Technology

Postorder traversal of a binary tree

A) first visits the root, then recursively traverses the left and right subtree B) recursively traverses the left subtree, then visits the root, then traverses the right subtree C) recursively traverses the left subtree, then traverses the right subtree, then visits the root D) visits all the nodes according to their natural order

Computer Science & Information Technology

All of the following are types of e-commerce business EXCEPT ________

A) C2C B) B2C C) B2B D) C2B

Computer Science & Information Technology

A(n) ________ displays data from an underlying table, query, or SQL statement as specified in the report's Record Source property

A) main report B) bound report C) unbound report D) subreport

Computer Science & Information Technology