nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #233

CERTIFIED-IN-CYBERSECURITY Question #233: Real Exam Question with Answer & Explanation

The correct answer is B: DLP. DLP is a technology used to identify, monitor, and protect sensitive data to prevent unauthorized access, use, or transmission. It can detect unauthorized storage of sensitive data on hard drives and other storage devices and can also prevent the copying or transfer of such data

Security Operations: Understand Data Security

Question

What is the best technology for detecting unauthorized storage of sensitive data on hard drives? ()

Options

  • ATLS
  • BDLP
  • CIPS
  • DIDS

Explanation

DLP is a technology used to identify, monitor, and protect sensitive data to prevent unauthorized access, use, or transmission. It can detect unauthorized storage of sensitive data on hard drives and other storage devices and can also prevent the copying or transfer of such data to external storage devices or networks. IDS and IPS are intrusion detection and prevention systems, respectively, which focus on network traffic and behavior, and are not specifically designed for detecting unauthorized storage of data. TLS is a protocol used to encrypt and secure data transmissions over networks and is not designed specifically for detecting unauthorized data storage on hard drives.

Topics

#Data Loss Prevention#Data Security#Endpoint Security#Sensitive Data

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions