A corporate fileshare holds files for multiple departments. Individual users in each department create reports that are meant to be read by the rest of the company. Recently, a user ran a malicious executable that encrypted all of the documents on the fileshare. The software asked for money to be transferred via cryptocurrency in order to decrypt the files; however, the files were not decrypted after the company paid the ransom. Which of the following would MOST likely minimize the damage to a fileshare in this type of situation?
A) Enable System Restore on the file server and make frequent restore points.
B) Disable full disk encryption on the file server.
C) Install a next-generation firewall at the network edge.
D) Use a host-based intrusion detection system and continuously monitor filesystem changes.
E) Use granular file permissions on the share and follow the principle of least privilege.
Correct Answer:
Verified
Q293: A technician is having issues with the
Q294: A customer is pressuring a project manager
Q295: An office location regularly experiences brownouts. Which
Q296: Which of the following can be applied
Q297: Which of the following types of social
Q299: Which of the following BEST describes the
Q300: A customer's computer is powered on and
Q301: A customer built a computer with the
Q302: A technician is investigating connectivity issues over
Q303: Joe, a technician, is configuring advanced security
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents