Question: 1
A implementing a DLP solution In order to reslnct PHI documents which of the following should be performed FIRST?
Question: 2
A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether the file was modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?
Question: 3
The Chief Information Security Officer directed a nsk reduction in shadow IT and created a policy requiring all unsanctioned high-nsk SaaS applications to be blocked from user access Which of the following is the BEST security solution to reduce this risk?
Question: 4
A company recently experienced a significant data loss when proprietary Information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the BEST remediation for this data leak?
Question: 5
A security analyst Is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m, - 4:00 a.m, The malware has evaded detection by traditional antivirus software. Which of the
following types of malware Is MOST likely infecting the hosts?