A systems administrator at a healthcare organization is setting up a server to securely store patient data. Which of the following must be ensured when storing PHI?
Which of the following methods can be used to detect attackers who have successfully infiltrated a network? (Select two).
An incident response team for a media streaming provider is investigating a data exfiltration event of licensed video content that was able to circumvent advanced monitoring analytics The team has identified the following:
1 The analytics use machine learning with classifiers to label network data transfers.
2. Transfers labeled as "authenticated media stream’’ are permitted to egress, all ethers are interrupted/dropped
3. The most recent attempt was erroneously labeled as an "authenticated media stream."
4. An earlier attempt from the same threat actor was unsuccessful and labeled as "unauthorized media transfer."
5. The PCAP from the most recent event looks identical with the exception of a few bytes that had been modified
Which of the following moil likely occurred?
Which of the following can be used to identify potential attacker activities without affecting production servers?