Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
To effectively identify and mitigate Advanced Persistent Threats (APTs) in critical data stores, which combination of security technologies and practices is most effective?
A
Focus on strong perimeter defenses, such as firewalls and antivirus software, to prevent APTs from gaining initial access to the data environment.
B
Integrate behavioral analytics and machine learning-based security monitoring tools that analyze access patterns and system logs for indicators of compromise, along with an incident response plan tailored to data breaches.
C
Deploy network intrusion detection systems (NIDS) at the perimeter of the data environment, complemented by regular penetration testing to identify vulnerabilities.
D
Utilize database activity monitoring (DAM) solutions that specifically look for unusual data access or manipulation patterns, coupled with endpoint detection and response (EDR) systems for real-time threat mitigation.