Which of the following solutions is the BEST method for controlling data exfiltration during this project?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A software development company needs to augment staff by hiring consultants for a high-stakes project.

The project has the following requirements:

– Consultants will have access to highly confidential, proprietary data.

– Consultants will not be provided with company-owned assets.

– Work needs to start immediately.

– Consultants will be provided with internal email addresses for communications.

Which of the following solutions is the BEST method for controlling data exfiltration during this project?
A . Require that all consultant activity be restricted to a secure VDI environment
B . Require the consultants to sign an agreement stating they will only use the company-provided email address for communications during the project
C . Require updated antivirus, USB blocking, and a host-based firewall on all consultant devices
D . Require the consultants to connect to the company VPN when accessing confidential resources

Answer: A

Leave a Reply

Your email address will not be published.