Question No 9:
A system security analyst using an enterprise monitoring tool notices an unknown internal host exfiltrating
files to several foreign IP addresses. Which of the following would be an appropriate mitigation technique?
A. Disabling unnecessary accounts
B. Rogue machine detection
C. Encrypting sensitive files
D. Implementing antivirus
Answer: B
No comments:
Post a Comment
Note: only a member of this blog may post a comment.