Notifications
Clear all
Topic starter
21/09/2022 9:05 pm
A company’s Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential files. Any changes to these files must be tied back to a specific authorized user’s activity session.
Which of the following is the BEST technique to address the CISO’s concerns?
- A . Configure DLP to reject all changes to the files without pre-authorization. Monitor the files for unauthorized changes.
- B . Regularly use SHA-256 to hash the directory containing the sensitive information. Monitor the files for unauthorized changes.
- C . Place a legal hold on the files. Require authorized users to abide by a strict time context access policy.
Monitor the files for unauthorized changes. - D . Use Wireshark to scan all traffic to and from the directory. Monitor the files for unauthorized changes.
Suggested Answer: CA