Which of the following can be implemented to maintain data confidentiality?

While investigating network traffic, a cloud administrator discovers the monthly billing has increased substantially. Upon further review, it appears the servers have been compromised, and sensitive files have been exfiltrated.

Which of the following can be implemented to maintain data confidentiality?
A . Hardening
B . IAM
C . Encryption
D . IPSec

Answer: C

Explanation:

The best method to maintain data confidentiality after discovering that the servers have been compromised and sensitive files have been exfiltrated is encryption. Encryption is a process that transforms data into an unreadable format using an algorithm and a key. Encryption can protect data at rest, in transit, or in use from unauthorized access, tampering, or leakage. The systems administrator should encrypt the sensitive files and their backups using strong encryption algorithms and keys, and also encrypt the network traffic using protocols such as SSL or IPSec.

Reference: CompTIA Cloud+ Certification Exam Objectives, Domain 2.0 Security, Objective 2.5 Given a scenario, apply data security techniques in the cloud.

Latest CV0-003 Dumps Valid Version with 144 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments