Certified Ethical Hacker (CEH) Practice Question

During a quarterly audit, the SOC discovers that a privileged database administrator has been compressing customer-data tables after business hours and uploading the resulting archives to a personal cloud storage account over HTTPS (TCP 443). The activity bypasses the organization's email-based DLP controls, yet normal web and application traffic on port 443 must remain uninterrupted for business operations. According to recommended countermeasures for insider threats, which immediate technical control would most effectively stop further exfiltration while still allowing legitimate outbound web usage from the database servers?

  • Deploy endpoint detection and response (EDR) agents to monitor the administrator's workstation for malicious software.

  • Enforce full-disk and tablespace encryption on the database server to secure data at rest.

  • Enable a restrictive outbound web proxy with destination whitelisting and SSL inspection for the database servers.

  • Implement user behavior analytics (UBA) to baseline normal activities and trigger alerts on anomalies.

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot