Notifications
Clear all
Topic starter
13/06/2022 5:48 pm
A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with finding the proper control functions to verity that a user's data is not altered without the user's consent.
Which of the following would be an appropriate course of action?
- A . Use a DLP product to monitor the data sets for unauthorized edits and changes.
- B . Use encryption first and then hash the data at regular, defined times.
- C . Automate the use of a hashing algorithm after verified users make changes to their data
- D . Replicate the data sets at regular intervals and continuously compare the copies for
unauthorized changes.
Suggested Answer: A