Register
12:00
Stop
CISSP - Security and Privacy Controls - Security Governance and Risk Management
Beginner
1/12
The security department at XYZ Corporation suspects insider threat after noticing multiple unauthorized access attempts to highly sensitive data. Which of the following measures would be the BEST to identify and track user activities?
a.
Migrate data to an encrypted server
b.
Increase physical security efforts
c.
Implement User and Entity Behavior Analytics (UEBA)
d.
Implement stronger access controls
Beginner