A state-funded competitor is focusing on gathering confidential information from a pharmaceutical research center. Unusual outbound connections suggest that the competitor might be taking advantage of newly developed findings. Which action limits this covert activity while preserving global relationships?
Increase network logs and implement division of key systems to track unusual transmissions and constrain data routes.
Periodically check international partner addresses without adding any new network segregation measures.
Prevent employees from using internal secure data transport so malicious traffic is easier to spot.
Terminate all external links related to international research collaborators to stop external infiltration attempts.
Increasing the level of network logs and applying segmentation constraints prevents unauthorized flows and better highlights any malicious patterns. Extended logging captures unusual traffic, while segmentation restricts channels for data extraction. Blocking all foreign connections hinders necessary business interactions. Disabling secure channels compromises data integrity. Verifying partner addresses alone is not enough without further security controls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation, and how does it enhance security?
Open an interactive chat with Bash
How does increasing network logging detect malicious activities?
Open an interactive chat with Bash
Why is it important to preserve global research collaborations while enhancing security?