A remote employee navigates to a shopping website on their company-owned computer. The employee clicks a link that contains a malicious file. Which of the following would prevent this file from downloading?
DLP would prevent the malicious file from downloading.
Data Loss Prevention (DLP) solutions are designed to monitor and protect sensitive information from being compromised or downloaded improperly. In this scenario, a DLP system can block the download of malicious files by identifying and preventing the transfer of harmful data based on predefined policies.
DLP systems are effective at preventing unauthorized downloads, including malicious files, by monitoring data transfers and blocking actions that violate security policies. They can recognize potentially harmful content and take action to prevent the file from being downloaded, thus safeguarding the system from threats.
File Integrity Monitoring (FIM) is designed to track changes to files and alert administrators about unauthorized modifications. While it is useful for ensuring that files remain unaltered, it does not actively prevent files from being downloaded; it only detects changes after the fact, making it ineffective in this scenario.
Network Access Control (NAC) regulates devices on a network and ensures they comply with security policies before granting access. However, NAC does not specifically target the downloading of files; it primarily focuses on the security posture of devices attempting to connect to the network, leaving file downloads unmonitored.
Endpoint Detection and Response (EDR) solutions monitor and respond to threats on endpoints by detecting malicious activity. While EDR can identify and respond to malware after it has downloaded, it does not prevent the actual downloading of files, which is the critical action needed in this scenario.
In the context of preventing the download of malicious files, DLP stands out as the most effective solution due to its proactive monitoring and blocking capabilities. Other options, such as FIM, NAC, and EDR, serve important roles in security but do not specifically address the need to stop malicious file downloads. Therefore, implementing DLP is essential for protecting sensitive information and maintaining a secure computing environment.
Related Questions
View allWhich of the following control types describes an alert from a SIEM to...
Which of the following types of identification methods can be performe...
During an investigation, a security analyst discovers traffic going ou...
Which of the following attacks is being attempted?
A security manager wants to reduce the number of steps required to ide...
Related Quizzes
View allCompTIA A Plus Certification Exam
CompTIA A Plus Exam Questions
CompTIA A Plus 1001 Exams Practice
CompTIA A Plus Practice Exam
CompTIA CySA+ Cybersecurity Analyst Certification all in One Exam Guide
CompTIA Network Plus Certification Exam Quiz
Free CompTIA Security Plus Practice Test
CompTIA Security Plus Simulation Questions
CompTIA Security Plus 501 Practice Questions
CompTIA Security Plus Example Questions
- ✓ 500+ Practice Questions
- ✓ Detailed Explanations
- ✓ Progress Analytics
- ✓ Exam Simulations