A research division observes an uncharacteristic spike in data transfers. An investigation finds numerous unauthorized sharing services running on users’ machines that bypass standard policies. Which measure best discovers and controls these services while allowing daily work to proceed?
Integrate a specialized traffic-monitoring solution that highlights abnormal software usage
Mandate each department send a quarterly list of used services for manual validation
Increase data encryption on each user machine to block suspicious file transfers
Restrict each user’s environment to approved applications and enforce disciplinary action when unlisted tools appear
Specialized detection tools analyze network behavior, revealing hidden connections and unapproved software usage. This proactive approach helps security teams quickly address lingering risks and avoid guesswork. Merely encrypting data or issuing a policy requiring employees to disclose usage can lead to blind spots and delays. Restricting applications through punitive measures deters compliance but does not uncover covert operations in real time.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a specialized traffic-monitoring solution?
Open an interactive chat with Bash
How does analyzing network behavior reveal unauthorized software?
Open an interactive chat with Bash
What are the risks of relying solely on manual reviews for policy enforcement?