An organization wants to strengthen data loss prevention while allowing typical email flow. Which measure is the best approach for detecting and limiting sensitive files from being shared in email attachments?
Perform attachment inspection and block flagged items from leaving the mail client
Encrypt all endpoints to obscure files from external viewers
Disable outbound port usage to counter external file transfers through email
Use multi-factor checks for email login to confirm authorized users
Email-based DLP solutions can scan attachments for sensitive content and enforce rules to block unauthorized file transfers before they leave the mail client. This method ensures compliance without interrupting normal communication. In contrast, encrypting endpoints protects stored data but does not monitor email activity. Blocking outbound ports is overly restrictive, and MFA protects accounts—not the contents of outgoing messages.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do email-based DLP solutions perform attachment inspection to detect sensitive content?
Open an interactive chat with Bash
What are some examples of sensitive content that DLP solutions are designed to detect?
Open an interactive chat with Bash
Why is blocking outbound ports considered overly restrictive for email DLP measures?