Which of the following courses of action is appropriate?

A Chief Executive Officer (CEO) is concerned about the company’s intellectual property being leaked to competitors. The security team performed an extensive review but did not find any indication of an outside breach. The data sets are currently encrypted using the Triple Data Encryption Algorithm.

Which of the following courses of action is appropriate?
A . Limit all access to the sensitive data based on geographic access requirements with strict role-based access controls.
B . Enable data masking and reencrypt the data sets using AES-256.
C . Ensure the data is correctly classified and labeled, and that DLP rules are appropriate to prevent disclosure.
D . Use data tokenization on sensitive fields, reencrypt the data sets using AES-256, and then create an MD5 hash.

Answer: C

Latest CS0-002 Dumps Valid Version with 220 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments