Which of the following would be the BEST technology control to use in this scenario?
A company is trying to limit the risk associated with the use of unapproved USB devices to copy
documents. Which of the following would be the BEST technology control to use in this scenario?
Which of the following would be the BEST control to implement?
Several employees have been printing files that include personally identifiable information of customers.
Auditors have raised concerns about the destruction of these hard copies after they are created, and
management has decided the best way to address this concern is by preventing these files from being
printed.
Which of the following would be the BEST control to implement?
Which of the following security strategies allows a company to limit damage to internal systems and provides l
Which of the following security strategies allows a company to limit damage to internal systems and
provides loss control?
how should Matt meet this requirement?
Matt, a security analyst, needs to implement encryption for company data and also prevent theft of
company data. Where and how should Matt meet this requirement?
Which of the following controls could be utilized to minimize the risk involved with the use of USB drives?
An employee recently lost a USB drive containing confidential customer data. Which of the following
controls could be utilized to minimize the risk involved with the use of USB drives?
Which of the following controls would prevent an employee from emailing unencrypted information to their perso
Which of the following controls would prevent an employee from emailing unencrypted information to
their personal email account over the corporate network?
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues?
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues?
(Select TWO).
Which of the following assets is MOST likely considered for DLP?
Which of the following assets is MOST likely considered for DLP?
Which of the following can be implemented to provide for data confidentiality assurance during and after the m
The Chief Information Officer (CIO) is concerned with moving an application to a SaaS cloud provider.
Which of the following can be implemented to provide for data confidentiality assurance during and after
the migration to the cloud?
Which of the following is a Data Loss Prevention (DLP) strategy and is MOST useful for securing data in use?
Which of the following is a Data Loss Prevention (DLP) strategy and is MOST useful for securing data in
use?