A state-funded competitor is focusing on gathering confidential information from a pharmaceutical research center. Unusual outbound connections suggest that the competitor might be taking advantage of newly developed findings. Which action limits this covert activity while preserving global relationships?
Prevent employees from using internal secure data transport so malicious traffic is easier to spot.
Periodically check international partner addresses without adding any new network segregation measures.
Terminate all external links related to international research collaborators to stop external infiltration attempts.
Increase network logs and implement division of key systems to track unusual transmissions and constrain data routes.
Increasing the level of network logs and applying segmentation constraints prevents unauthorized flows and better highlights any malicious patterns. Extended logging captures unusual traffic, while segmentation restricts channels for data extraction. Blocking all foreign connections hinders necessary business interactions. Disabling secure channels compromises data integrity. Verifying partner addresses alone is not enough without further security controls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation, and how does it help in preventing unauthorized data flows?
Open an interactive chat with Bash
Why are extended network logs important in detecting unusual traffic patterns?
Open an interactive chat with Bash
Why is it important to preserve international partnerships while addressing cybersecurity threats?