140k views
5 votes
A company recently implemented a variety of security services to detect various types of traffic that pose a threat to the company. The following services were enabled within the network:

1. Scan of specific subsets for vulnerabilities
2. Categorizing and logging of website traffic
3. Enabling specific ACLs based on application traffic
4. Sending suspicious files to a third-party site for validation
A report was sent to the security team that identified multiple incidents of users sharing large amounts of data from an on-premise server to a public site. A small percentage of that data also contained malware and spyware

Which of the following services MOST likely identified the behavior and sent the report?

A. Content filter
B. User behavioral analytics
C. Application sandbox
D. Web application firewall
E. Endpoint protection
F. Cloud security broker

User Cezn
by
7.5k points

1 Answer

5 votes

Final answer:

The security service most likely responsible for identifying the anomalous data transfer with malware and spyware is User Behavioral Analytics (B), which detects deviations from normal user activity patterns, indicative of potential security threats.

Step-by-step explanation:

The service that most likely identified the behavior of users sharing large amounts of data with malware and spyware from an on-premise server to a public site, and then sent the report, is User Behavioral Analytics (B). This type of security service specializes in analyzing and detecting anomalies in user behavior that deviate from the norm, which would include unusually large data transfers. When such activities are coupled with the presence of malware and spyware, it further reinforces the notion of a potential security threat that would prompt an alert.

By monitoring user activities and employing advanced algorithms to detect unusual patterns, User Behavioral Analytics can discern threats that traditional security measures might overlook. This is particularly useful in a complex cybersecurity landscape where threats can not only be external but also come from within an organization, often as a result of compromised credentials or insider threats.

Other services like Application Sandboxes (C) or Web Application Firewalls (D) provide security against specific types of threats, such as protecting against malicious input or code execution in the case of the former, or monitoring HTTP/HTTPS requests to a web service in the case of the latter, but they are not specifically designed to monitor data transfers or user behavior patterns.

User Pida
by
7.6k points