A systems engineer is working in conjunction with security and has set up a data loss prevention solution. What remediation action should they choose to quarantine and replace files with a policy violation notice?

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

The focus here is on the term "quarantine," which refers to the process of isolating a file that violates policy from the rest of the system to prevent further exposure or damage while also allowing for investigation and remediation. Selecting a quarantine action indicates that the file in question will be placed in a safe space where it cannot be accessed or executed until further analysis is completed. This ensures that potential threats are contained and do not interfere with normal operations.

By utilizing a quarantine approach, the systems engineer can effectively manage policy violations without permanently deleting the files or alerting users in ways that could lead to panic or data loss. It signifies a controlled response where the files can be reviewed, and a notification can be provided about the policy violation, ultimately leading to appropriate actions based on the outcome of the review.

The other options do not align with the specific need to isolate and notify users about violations. Blocking an item would prevent access but wouldn’t provide the opportunity for further review or notice to the user about what action was taken. An alert would simply notify about the violation without taking further action on the file itself. Tombstoning typically refers to marking a record for deletion in databases rather than addressing security policies directly.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy