A senior security engineer has been tasked with ensuring the confidentiality and integrity of the organization’s most valuable personally identifiable information (PII). This data is stored on local file and database servers within the organization’s data center. The following security measures have been implemented to ensure that unauthorized access is detected and logged.
• Network segmentation and enhanced access logging of the database and file servers
• Implemented encryption of data at rest
• Implemented full packet capture of the network traffic in and out of the sensitive network segment
• Ensured all transaction log data and packet captures are backed up to corporate backup appliance within the corporate backup network segment
Which of the following is the MOST likely way to exfiltrate PII while avoiding detection?
l00t
Highly Voted 1 year, 9 months agojackdryan
1 year, 6 months agoch0udhary
Most Recent 3 days, 15 hours agoGuardianAngel
9 months, 2 weeks agogjimenezf
9 months, 3 weeks ago[Removed]
10 months ago629f731
10 months, 1 week agoYesPlease
11 months agoSoleandheel
11 months, 1 week agoInclusiveSTEAM
1 year, 1 month agoHughJassole
1 year, 5 months agoTygrond87
1 year, 6 months agoaleXplicitly
1 year, 7 months ago[Removed]
1 year, 7 months agosausageman
1 year, 8 months agosausageman
1 year, 8 months agorealmjmj
1 year, 9 months agoJohnyDal
1 year, 9 months agoyottabyte
1 year, 9 months agobherto39
1 year, 2 months ago