A senior security engineer has been tasked with ensuring the confidentiality and integrity of the organization’s most valuable personally identifiable information (PII). This data is stored on local file and database servers within the organization’s data center. The following security measures have been implemented to ensure that unauthorized access is detected and logged.
• Network segmentation and enhanced access logging of the database and file servers
• Implemented encryption of data at rest
• Implemented full packet capture of the network traffic in and out of the sensitive network segment
• Ensured all transaction log data and packet captures are backed up to corporate backup appliance within the corporate backup network segment
Which of the following is the MOST likely way to exfiltrate PII while avoiding detection?
l00t
Highly Voted 2 years agojackdryan
1 year, 9 months agoayadmawla
Most Recent 3 weeks, 5 days agoch0udhary
3 months agoGuardianAngel
1 year agogjimenezf
1 year ago[Removed]
1 year, 1 month ago629f731
1 year, 1 month agoYesPlease
1 year, 2 months agoSoleandheel
1 year, 2 months agoInclusiveSTEAM
1 year, 4 months agoHughJassole
1 year, 8 months agoTygrond87
1 year, 9 months agoaleXplicitly
1 year, 10 months ago[Removed]
1 year, 10 months agosausageman
1 year, 11 months agosausageman
1 year, 11 months agorealmjmj
1 year, 12 months agoJohnyDal
2 years ago