
Ultimate access to all questions.
Your organization is using Microsoft 365 and has recently identified a potential data exfiltration attempt. The security team is tasked with investigating and mitigating this threat. The organization operates in a highly regulated industry, requiring strict compliance with data protection laws. Additionally, the solution must minimize operational disruption and ensure business continuity. Given these constraints, which of the following steps should be taken to effectively investigate and mitigate the threat? (Choose the best single option)
A
Immediately revoke all user access privileges to prevent further data loss, without analyzing the situation, to ensure compliance with data protection laws.
B
Monitor and analyze user activities and access patterns using Microsoft 365's built-in security tools to identify potential data exfiltration activities, ensuring minimal operational disruption.
C
Conduct a thorough investigation to determine the scope and impact of the data exfiltration attempt, including identifying the compromised data or resources, but delay any mitigation actions until the investigation is complete to avoid unnecessary operational disruptions.
D
Implement a combination of monitoring user activities, conducting a thorough investigation, and applying targeted containment and mitigation measures, such as revoking specific access privileges or isolating affected systems, while notifying relevant stakeholders to ensure compliance and business continuity.
E
All of the above.