
Answer-first summary for fast verification
Answer: Deploy Data Loss Prevention (DLP) solutions at network exit points and enforce strict firewall rules.
The correct answer is **C. Deploy Data Loss Prevention (DLP) solutions at network exit points and enforce strict firewall rules.** This approach is effective because: 1. **DLP solutions** are specifically designed to monitor, detect, and prevent unauthorized data egress. They can identify sensitive data attempting to leave the network and enforce policies to block such attempts. 2. **Strict firewall rules** act as a barrier between trusted and untrusted networks, controlling data flow and preventing unauthorized transfers. Combining these strategies provides a comprehensive defense against data leakage. Other options are less effective: - **A (Manual log reviews)** are inefficient and cannot detect issues in real-time. - **B (Encryption)** secures data in transit but does not prevent unauthorized access if keys are compromised. - **D (API gateways)** help manage data egress but lack the specific capabilities of DLP solutions for preventing unauthorized transfers.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
To effectively monitor and control the movement of data out of your environment to prevent unauthorized egress, which combination of strategies and tools should you implement?
A
Rely on manual reviews of network logs to identify potential unauthorized data transfers.
B
Use encryption for all data in transit, assuming it protects against unauthorized access.
C
Deploy Data Loss Prevention (DLP) solutions at network exit points and enforce strict firewall rules.
D
Implement API gateways with rate limiting and monitoring for all data egress points.
No comments yet.