The network administrator at an enterprise reported a large data leak. One compromised server was used to aggregate data from several critical application servers and send it out to the Internet using HTTPS. Upon investigation, there have been no user logins over the previous week and the endpoint protection software is not reporting any issues. Which of the following BEST provides insight into where the compromised server collected the information?
A . Review the flow data against each server’s baseline communications profile.
B . Configure the server logs to collect unusual activity including failed logins and restarted services.
C . Correlate data loss prevention logs for anomalous communications from the server.
D . Setup a packet capture on the firewall to collect all of the server communications.
Answer: A
Leave a Reply