Question 96

Data spillage occurred when an employee accidentally emailed a sensitive file to an external recipient.
Which of the following controls would have MOST likely prevented this incident?
  • Question 97

    A security analyst discovered a specific series of IP addresses that are targeting an organization. None of the attacks have been successful. Which of the following should the security analyst perform NEXT?
  • Question 98

    Which of the following threat classifications would MOST likely use polymorphic code?
  • Question 99

    A security administrator needs to create an IDS rule to alert on FTP login attempts by root. Which of the following rules is the BEST solution?
  • Question 100

    A cybersecurity analyst has received an alert that well-known "call home" messages are continuously observed by network sensors at the network boundary.
    The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?