Question 246

A company has drafted an insider-threat policy that prohibits the use of external storage devices.
Which of the following would BEST protect the company from data exfiltration via removable media?
  • Question 247

    Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?
  • Question 248

    Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
  • Question 249

    An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?
  • Question 250

    A user contacts the help desk to report the following:
    - Two days ago, a pop-up browser window prompted the user for a name
    and password after connecting to the corporate wireless SSID. This had
    never happened before, but the user entered the information as
    requested.
    - The user was able to access the Internet but had trouble accessing
    the department share until the next day.
    - The user is now getting notifications from the bank about
    unauthorized transactions.
    Which of the following attack vectors was MOST likely used in this scenario?