Which of the following would be an appropriate mitigation technique?

A system security analyst using an enterprise monitoring tool notices an unknown internal host
exfiltrating files to several foreign IP addresses. Which of the following would be an appropriate
mitigation technique?

A system security analyst using an enterprise monitoring tool notices an unknown internal host
exfiltrating files to several foreign IP addresses. Which of the following would be an appropriate
mitigation technique?

A.
Disabling unnecessary accounts

B.
Rogue machine detection

C.
Encrypting sensitive files

D.
Implementing antivirus



Leave a Reply 0

Your email address will not be published. Required fields are marked *