Which of the follow...
 
Notifications
Clear all

Which of the following is the BEST technique to address the CISO’s concerns?

1 Posts
1 Users
0 Likes
272 Views
(@katterjohnoctavio)
Posts: 721
Noble Member
Topic starter
 

A company’s Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential files. Any changes to these files must be tied back to a specific authorized user’s activity session .

Which of the following is the BEST technique to address the CISO’s concerns?

  • A . Configure DLP to reject all changes to the files without pre-authorization. Monitor the files for unauthorized changes.
    B. Regularly use SHA-256 to hash the directory containing the sensitive information.
    Monitor the files for unauthorized changes.
    C. Place a legal hold on the files. Require authorized users to abide by a strict time context access policy.
    Monitor the files for unauthorized changes.
    D. Use Wireshark to scan all traffic to and from the directory. Monitor the files for unauthorized changes.

Show Answer Hide Answer

Suggested Answer: A,C
 
Posted : 16/02/2023 11:44 am
Topic Tags

Latest CS0-002 V2 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: