Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
To effectively monitor and control the movement of data out of your environment to prevent unauthorized egress, which combination of strategies and tools should you implement?
A
Rely on manual reviews of network logs to identify potential unauthorized data transfers.
B
Use encryption for all data in transit, assuming it protects against unauthorized access.
C
Deploy Data Loss Prevention (DLP) solutions at network exit points and enforce strict firewall rules.
D
Implement API gateways with rate limiting and monitoring for all data egress points.