subject
Computers and Technology, 19.08.2021 22:40 sin16

Confidential information related to Application A, Application B, and Project X appears to have been leaked to a competitor. After consulting with the legal team, the IR team is advised to take immediate action to preserve evidence for possible litigation and criminal charges. While reviewing the rights and group ownership of the data involved in the breach, the IR team inspects the following distribution group access lists:
Group Name: product-updates-application-a
Members: administrator, app-support, dev-ops, jdoe, jsmith, mpeters
Group Name: pending-bug-fixes-application-a
Members: administrator, app-support, dev-ops, jsmith, jdoe, mpeters, rwilliams
Group Name: inflight-updates-application-b
Members: app-support, dev-ops, jdoe, nbrown, jsmith
Group Name: PoC-project-x
Members: dev-support, product-mgt, jsmith, nbrown, rwilliams
Which of the following actions should the IR team take FIRST?
A. Remove all members from the distribution groups immediately.
B. Place the mailbox for jsmith on legal hold.
C. Implement a proxy server on the network to inspect all outbound SMTP traffic for the DevOps group.
D. Install DLP software on all developer laptops to prevent data from leaving the network.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 17:00
Match the following. 1. show grouping of word processing tasks that can be performed quick access toolbar 2. shortcut location for commonly used elements scroll bars 3. organized commands used to modify documents ribbon 4. used to align and measure content in a word screen zoom bar 5. vertical and horizontal bars that are used to navigate through a document contextual tabs 6. displays the name of the document in use ruler 7. allows users to enlarge or shrink a visual of a word document title bar
Answers: 2
question
Computers and Technology, 22.06.2019 22:30
Alex’s family members live in different parts of the world. they would like to discuss the wedding plans of one of their distant relatives. however, alex wants all the family members to talk to each other simultaneously so that they can make decisions quickly. which mode of internet communication should they use? a. blog b. email c. wiki d. message board e. instant messaging
Answers: 2
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. which step can possibly increase the severity of an incident? a. separating sensitive data from non-sensitive data b. immediately spreading the news about the incident response plan c. installing new hard disks d. increasing access controls
Answers: 2
question
Computers and Technology, 24.06.2019 22:00
Is the process of organizing data to reduce redundancy. a. normalization b. primary keying c. specifying relationships d. duplication
Answers: 1
You know the right answer?
Confidential information related to Application A, Application B, and Project X appears to have been...
Questions
question
World Languages, 05.11.2020 16:40
Questions on the website: 13722362