Which of the following controls can be implemented to m…

Joe, a website administrator, believes he owns the intellectual property for a company invention and has been
replacing image files on the company’s public facing website in the DMZ. Joe is using steganography to hidestolen data. Which of the following controls can be implemented to mitigate this type of inside threat?

Joe, a website administrator, believes he owns the intellectual property for a company invention and has been
replacing image files on the company’s public facing website in the DMZ. Joe is using steganography to hidestolen data. Which of the following controls can be implemented to mitigate this type of inside threat?

A.
Digital signatures

B.
File integrity monitoring

C.
Access controls

D.
Change management

E.
Stateful inspection firewall



Leave a Reply 0

Your email address will not be published. Required fields are marked *