After a routine audit, a company discovers that engineering documents have been leaving the network on a particular port. The company must allow outbound traffic on this port, as it has a legitimate business use. Blocking the port would cause an outage. Which of the following technology controls should the company implement?

A. NAC
B. Web proxy
C. DLP
D. ACL


Answer: C. DLP

Computer Science & Information Technology

You might also like to view...

What are the basic components of Windows 10 that support networking?

What will be an ideal response?

Computer Science & Information Technology

Match each item with a statement below.

A. a server that hold a copy of Active Directory information B. the Active Directory partition that holds domain-specific information, such as user and computer accounts, that is replicated only between domain controllers within the domain C. the Active Directory partition that holds general information about the Active Directory forest and application configuration information. It is replicated to all domain controllers in the Active Directory forest D. holds the definitions of all objects and object attributes for the forest E. feature integrated with Active Directory that can be used to centrally manage the configuration of a Windows 10 computer F. a collection of Group Policy settings applied to the Windows 10 computer G. one or more identifiers included in a hardware device that is used by Windows 10 to locate and install an appropriate driver for a hardware device H. an identifier included with a hardware device driver that describes how the device driver is to be installed I. a Windows Server service that is used to simplify the process of applying images to computers

Computer Science & Information Technology

I have an algorithm that runs in O(n2), where n is the size of the problem. What does “the size of the problem” mean?

What will be an ideal response?

Computer Science & Information Technology

It is sometimes easier to protect a network from the Internet than from an inside attack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology