CompTIA Exam Questions

Which of the following would be an appropriate mitigation technique?

A system security analyst using an enterprise monitoring tool notices an unknown internal
host exfiltrating files to several foreign IP addresses. Which of the following would be an
appropriate mitigation technique?

A.
Disabling unnecessary accounts

B.
Rogue machine detection

C.
Encrypting sensitive files

D.
Implementing antivirus