Which of the follow...
 
Notifications
Clear all

Which of the following is the BEST technique to address the CISO’s concerns?

1 Posts
1 Users
0 Likes
301 Views
(@boehnkearden)
Noble Member
Joined: 2 years ago
Posts: 697
Topic starter  

A company’s Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential files. Any changes to these files must be tied back to a specific authorized user’s activity session.

Which of the following is the BEST technique to address the CISO’s concerns?

  • A . Configure DLP to reject all changes to the files without pre-authorization. Monitor the files for unauthorized changes.
  • B . Regularly use SHA-256 to hash the directory containing the sensitive information. Monitor the files for unauthorized changes.
  • C . Place a legal hold on the files. Require authorized users to abide by a strict time context access policy.
    Monitor the files for unauthorized changes.
  • D . Use Wireshark to scan all traffic to and from the directory. Monitor the files for unauthorized changes.

Show Answer Hide Answer

Suggested Answer: CA

   
Quote
Topic Tags

Latest CS0-002 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: