The security administrator receives an email on a non-company account from a coworker stating that some reports are not exporting correctly. Attached to the email was an example report file with several customers' names and credit card numbers with the PIN.Which of the following is the BEST technical controls that will help mitigate this risk of disclosing sensitive data?
A. Configure the mail server to require TLS connections for every email to ensure all transport data is encrypted
B. Create a user training program to identify the correct use of email and perform regular audits to ensure compliance
C. Implement a DLP solution on the email gateway to scan email and remove sensitive data or files
D. Classify all data according to its sensitivity and inform the users of data that is prohibited to share
Answer: C. Implement a DLP solution on the email gateway to scan email and remove sensitive data or files
You might also like to view...
Write Java statements to add menu items named “Circle”, “Square”, and “Rectangle” to the menu created in number 7 above.
What will be an ideal response?
The two most popular World Wide Web browsers are Netscape Communicator and Microsoft_________.
Fill in the blank(s) with the appropriate word(s).
What is the relationship between algorithms, pseudocode, and a programming language?
What will be an ideal response?
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it
a. does not share a communication circuit b. splits the communication circuit vertically (with time slots) instead of horizontally c. increases the wavelength and phase angles of the baseband frequency used for transmission d. moves the baseband of a circuit by shifting it to a higher frequency e. reduces baseband signal velocity more than frequency division multiplexing