A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation, the supervisor terminates an employee as a result of the suspected data loss. During the investigation, the supervisor is absent for the interview, and little evidence can be provided form the role-based authentication system in use by the company.The situation can be identified for future mitigation as which of the following?

A. Job rotation
B. Log failure
C. Lack of training
D. Insider threat

Answer: B. Log failure

Computer Science & Information Technology

You might also like to view...

Which of the following does NOT have a master?

A) Notes pages B) Templates C) Handouts D) Slides

Computer Science & Information Technology

Different types of organizations have similar levels of network security risks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology