A software development company needs to augment staff by hiring consultants for a high-stakes project. The project has the following requirements: Consultants will have access to highly confidential, proprietary data. Consultants will not be provided with company-owned assets. Work needs to start immediately. Consultants will be provided with internal email addresses for communications. Which of the following solutions is the BEST method for controlling data exfiltration during this project?
A) Require that all consultant activity be restricted to a secure VDI environment
B) Require the consultants to sign an agreement stating they will only use the company-provided email address for communications during the project
C) Require updated antivirus, USB blocking, and a host-based firewall on all consultant devices
D) Require the consultants to connect to the company VPN when accessing confidential resources
Correct Answer:
Verified
Q591: A help desk technician is trying to
Q592: Which of the following BEST explains why
Q593: A Chief Executive Officer (CEO) is staying
Q594: Which of the following controls is implemented
Q595: A transitive trust:
A) is automatically established between
Q597: After running an online password cracking tool,
Q598: A security administrator wants to better prepare
Q599: Which of the following is the purpose
Q600: A company occupies the third floor of
Q601: An organization would like to set up
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents