Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
In an environment where insider threats are a significant concern, which combination of strategies most effectively mitigates the risk of data exfiltration by malicious insiders?
A
Use a combination of anomaly detection systems, behavioral analytics, and segmented access controls to monitor and restrict unusual activities.
B
Implement strict role-based access controls, frequent security awareness training, and deploy data loss prevention (DLP) tools.
C
Enforce a policy of no personal device usage, conduct regular background checks, and utilize traditional firewall and antivirus solutions.
D
Rely on encryption of sensitive data at rest, periodic manual audits of access logs, and physical security measures.