Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server. Your defenses did not hold up to the test as originally thought. As you investigate how the data was compromised through log analysis you discover that a hardworking, but misguided business intelligence analyst posted the data to an obfuscated URL on a popular cloud storage service so they could work on it from home during their off-time. Which technology or solution could you deploy to prevent employees from removing corporate data from your network?
A) Rigorous syslog reviews
B) Intrusion Detection Systems (IDS)
C) Security Guards posted outside the Data Center
D) Data Loss Prevention (DLP)
Correct Answer:
Verified
Q179: Scenario: Your organization employs single sign-on (user
Q180: Which of the following statements about Encapsulating
Q181: Scenario: You are the CISO and are
Q182: Which type of physical security control scan
Q183: Scenario: Your company has many encrypted telecommunications
Q185: Bob waits near a secured door, holding
Q186: You are just hired as the new
Q187: Scenario: Most industries require compliance with multiple
Q188: Scenario: Your organization employs single sign-on (user
Q189: Scenario: Critical servers show signs of erratic
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents