An organization has hardened its end points m the following ways
* USB ports are disabled except for approved input device IDs (e.g, mouse, keyboard)
* A desktop firewall is Mocking all outbound network connections, except to approved internal systems
* A VPN client is the only way to connect to the corporate network remotely and split tunneling is disabled
* Bluetooth is disabled
* Web browsing from end points is permitted but the traffic is directed through the VPN to the corporate gateway
* The email client is permitted to connect to the internal server over the VPN and DLP rules prohibit sending sensitive information to external recipients
The organization recently suffered a security breach i which a file containing PlI somehow made it from a remote user's laptop to an unauthorized host Which of the following is the MOST likely for how (his happened?
Currently there are no comments in this discussion, be the first to comment!