A senior security engineer has been tasked with ensuring the confidentiality and integrity of the organization’s most valuable personally identifiable information (PII). This data is stored on local file and database servers within the organization’s data center. The following security measures have been implemented to ensure that unauthorized access is detected and logged.
• Network segmentation and enhanced access logging of the database and file servers
• Implemented encryption of data at rest
• Implemented full packet capture of the network traffic in and out of the sensitive network segment
• Ensured all transaction log data and packet captures are backed up to corporate backup appliance within the corporate backup network segment
Which of the following is the MOST likely way to exfiltrate PII while avoiding detection?
l00t
Highly Voted 2 years, 1 month agojackdryan
1 year, 10 months agoHazRic
Most Recent 1 week, 4 days agoServerBrain
1 week, 5 days agoayadmawla
2 months agoch0udhary
4 months, 1 week agoGuardianAngel
1 year, 1 month agogjimenezf
1 year, 1 month ago[Removed]
1 year, 2 months ago629f731
1 year, 2 months agoYesPlease
1 year, 3 months agoSoleandheel
1 year, 3 months agoInclusiveSTEAM
1 year, 5 months agoHughJassole
1 year, 9 months agoTygrond87
1 year, 10 months agoaleXplicitly
1 year, 11 months ago[Removed]
1 year, 11 months agosausageman
2 years agosausageman
2 years ago