اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 600 من 1040

كل الأسئلة

A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with finding the proper control functions to verify that a user's data is not altered without the user's consent. Which of the following would be an appropriate course of action?

الخيارات

  • A Automate the use of a hashing algorithm after verified users make changes to their data.
  • B Use encryption first and then hash the data at regular, defined times.
  • C Use a DLP product to monitor the data sets for unauthorized edits and changes.
  • D Replicate the data sets at regular intervals and continuously compare the copies for unauthorized changes.

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.