I recall a practice question where monitoring was emphasized. It seems like option D aligns with that, but I’m still a bit confused about how effective it would be in real scenarios.
I'm not entirely sure, but I feel like requiring encryption could help too. It seems like a good preventive measure, but does it really detect unauthorized disclosure?
I'm leaning towards reporting all outgoing confidential emails. That seems like a straightforward way to keep an eye on sensitive information leaving the company.
Monitoring all emails based on pre-defined criteria sounds like the best approach to me. That way you can catch any suspicious activity, even if the documents aren't marked as confidential.
Hmm, I'm not sure about this one. Encrypting documents seems like a good idea, but would that really help detect disclosure? I'll have to weigh the pros and cons of each choice.
This seems like a tricky one. I'll need to think carefully about the different options and how they would actually help detect unauthorized disclosure.
Based on my understanding, a bastion host is used to provide a secure entry point to a network, so it should be placed beyond the outer perimeter firewall, option C.
I think option D is the best way to go. Monitoring all emails based on pre-defined criteria seems like the most comprehensive approach to detect unauthorized disclosure.
Haley
3 months agoAudria
3 months agoYvonne
3 months agoDaron
4 months agoCarmelina
4 months agoNieves
4 months agoLaine
4 months agoOlga
4 months agoDorthy
5 months agoLauran
5 months agoArlette
5 months agoCarmelina
5 months agoChi
5 months agoDexter
5 months agoWeldon
1 year agoNelida
1 year agoGertude
1 year agoKimi
1 year agoPortia
1 year agoDerrick
1 year agoRex
1 year agoReena
1 year agoErin
1 year agoBerry
1 year agoNu
1 year agoAide
1 year agoDino
1 year agoReuben
1 year agoFreeman
1 year agoKiley
1 year agoClorinda
1 year agoMargery
1 year agoJerry
1 year agoReuben
1 year agoSherron
1 year agoZena
1 year agoCora
1 year agoKanisha
1 year ago