A system security analyst using an enterprise monitoring tool notices an unknown internal host
exfiltrating files to several foreign IP addresses. Which of the following would be an appropriate
mitigation technique?
A.
Disabling unnecessary accounts
B.
Rogue machine detection
C.
Encrypting sensitive files
D.
Implementing antivirus