A company that provides services to clients who work with highly sensitive data would like to provide assurance that the data's confidentiality is maintained in a dynamic, low-risk environment.
Which of the following would best achieve this goal? (Choose two.)
- Install a SOAR on all endpoints.
- Hash all files.
- Install SIEM within a SO
- Encrypt all data and files at rest, in transit, and in use.
- Configure SOAR to monitor and intercept files and data leaving the network.
- Implement file integrity monitoring.
Answer(s): D,F
Explanation:
Encrypt all data and files at rest, in transit, and in use: Encryption ensures that sensitive data is protected and its confidentiality is maintained. By encrypting data at all stages—whether stored (at rest), transmitted (in transit), or actively being processed (in use)—the company can significantly reduce the risk of unauthorized access or exposure, ensuring the confidentiality of highly sensitive data.
Implement file integrity monitoring: File Integrity Monitoring (FIM) ensures that files containing sensitive data are not altered without authorization. By monitoring changes to critical files, it helps detect tampering, modifications, or potential data breaches, adding an extra layer of security to sensitive information in a dynamic environment.
Reveal Solution
Next Question