A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation, the supervisor terminates an employee as a result of the suspected data loss. During the investigation, the supervisor is absent for the interview, and little evidence can be provided form the role-based authentication system in use by the company.The situation can be identified for future mitigation as which of the following?

A. Job rotation
B. Log failure
C. Lack of training
D. Insider threat


Answer: B. Log failure

Computer Science & Information Technology

You might also like to view...

Which include directive is necessary for file IO

a. #include b. #include c. #include d. #include

Computer Science & Information Technology

Match the following parts of the Animation Pane to their descriptions:

I. 0 tag II. numbered tag III. timeline IV. no tag V. icon A. indicating a Start: With Previous animation B. indicates the order of a Start: On Click animation C. indicates the order of a Start: After Previous animation D. duration of animation E. represents the type of animation effect applied

Computer Science & Information Technology

Changes CANNOT be made to a shared workbook when it is opened

Indicate whether the statement is true or false

Computer Science & Information Technology

________ gathering is critical to the development of a comprehensive warrant for a computer crime

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology