Which of the follow...
 
Notifications
Clear all

Which of the following courses of action is appropriate?

1 Posts
1 Users
0 Likes
159 Views
(@ferronigiovanni)
Noble Member
Joined: 2 years ago
Posts: 731
Topic starter  

A Chief Executive Officer (CEO) is concerned about the company’s intellectual property being leaked to competitors. The security team performed an extensive review but did not find any indication of an outside breach. The data sets are currently encrypted using the Triple Data Encryption Algorithm.

Which of the following courses of action is appropriate?

  • A . Limit all access to the sensitive data based on geographic access requirements with strict role-based access controls.
  • B . Enable data masking and reencrypt the data sets using AES-256.
  • C . Ensure the data is correctly classified and labeled, and that DLP rules are appropriate to prevent disclosure.
  • D . Use data tokenization on sensitive fields, reencrypt the data sets using AES-256, and then create an MD5 hash.

Show Answer Hide Answer

Suggested Answer: C

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: