Which of the follow...
 
Notifications
Clear all

Which of the following would be an appropriate course of action?

1 Posts
1 Users
0 Likes
155 Views
(@ozolinsezequiel)
Noble Member
Joined: 2 years ago
Posts: 701
Topic starter  

A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with finding the proper control functions to verity that a user's data is not altered without the user's consent.

Which of the following would be an appropriate course of action?

  • A . Use a DLP product to monitor the data sets for unauthorized edits and changes.
  • B . Use encryption first and then hash the data at regular, defined times.
  • C . Automate the use of a hashing algorithm after verified users make changes to their data
  • D . Replicate the data sets at regular intervals and continuously compare the copies for
    unauthorized changes.

Show Answer Hide Answer

Suggested Answer: A

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: