Which of the following is the BEST technique to address the CISO’s concerns?

A company’s Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential files. Any changes to these files must be tied back to a specific authorized user’s activity session.

Which of the following is the BEST technique to address the CISO’s concerns?
A . Configure DLP to reject all changes to the files without pre-authorization. Monitor the files for unauthorized changes.
B . Regularly use SHA-256 to hash the directory containing the sensitive information.
Monitor the files for unauthorized changes.
C . Place a legal hold on the files. Require authorized users to abide by a strict time context access policy.
Monitor the files for unauthorized changes.

D . Use Wireshark to scan all traffic to and from the directory. Monitor the files for unauthorized changes.

Answer: A,C

Latest CS0-002 Dumps Valid Version with 220 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>