exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 50 discussion

Actual exam question from CompTIA's CS0-002
Question #: 50
Topic #: 1
[All CS0-002 Questions]

A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with finding the proper control functions to verify that a user's data is not altered without the user's consent. Which of the following would be an appropriate course of action?

  • A. Automate the use of a hashing algorithm after verified users make changes to their data.
  • B. Use encryption first and then hash the data at regular, defined times.
  • C. Use a DLP product to monitor the data sets for unauthorized edits and changes.
  • D. Replicate the data sets at regular intervals and continuously compare the copies for unauthorized changes.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MortG7
Highly Voted 2 years, 6 months ago
DLP primary function is to prevent data exfiltration based on tagging. It is not used nor marketed to track authorized versus non-authorized changes...File Integrity Monitoring would be more suited for that..A is correct
upvoted 10 times
...
Davar39
Highly Voted 2 years, 11 months ago
Selected Answer: C
The question states privacy regulations - which translates to compliance regulations. DLP solutions provide capabilities that can assist you in compliance audits.
upvoted 9 times
...
zecomeia_007
Most Recent 9 months ago
Selected Answer: A
Therefore, automating the use of a hashing algorithm after verified user changes is the most appropriate and efficient method to verify data integrity in this scenario
upvoted 2 times
...
zhuzhu123
1 year, 4 months ago
Would go for A: DLP is mainly used to prevent data leakage: "The value of a DLP system resides in the level of precision with which it can locate and prevent the leakage of sensitive data." From the official cert guide for 002 Answer A also includes a verification of the user.
upvoted 3 times
...
32d799a
1 year, 4 months ago
Selected Answer: C
Data Loss Prevention (DLP) products are designed to monitor, detect, and prevent unauthorized access and changes to sensitive data. They can be configured to identify and alert on any unauthorized modifications to data, ensuring that any alterations can be investigated promptly.
upvoted 1 times
...
SimonR2
1 year, 8 months ago
C Data Loss Prevention (DLP) products are designed to monitor and protect sensitive data from being lost, leaked, or altered in an unauthorized manner. DLP solutions can help organizations identify and prevent data breaches, unauthorized modifications, and data exfiltration. In this context, using a DLP product would be a suitable approach because it allows continuous monitoring of the data sets for any unauthorized changes. The DLP solution can be configured to detect and alert on suspicious activities, ensuring that any unauthorized modifications trigger an immediate response.
upvoted 1 times
...
kmordalv
1 year, 9 months ago
C for me The Official CompTIA CySA+ about DLP said Document matching—A whole document can be matched using a fingerprint, but it is quite easy to modify a file so that it no longer matches the fingerprint. To compensate for this risk, partial document matching creates a series of hashes for overlapping parts of the document. These hashes can match content that has been copied from the document or used in a different order in another file (458 page)
upvoted 1 times
...
kyky
1 year, 10 months ago
Selected Answer: C
A Data Loss Prevention (DLP) product is designed to monitor and protect sensitive data from unauthorized access, use, or disclosure. It can help detect and prevent unauthorized edits and changes to user data by monitoring data sets for any suspicious activity. By implementing a DLP solution, the company can enforce policies and rules to prevent unauthorized alterations without the user's consent.
upvoted 1 times
...
bolubeyi
1 year, 12 months ago
using a DLP product to monitor the data sets for unauthorized edits and changes may be useful for detecting unauthorized access to the data, but it does not address the issue of data integrity. A is the correct answer
upvoted 2 times
...
kiduuu
2 years ago
Selected Answer: A
Using a Data Loss Prevention (DLP) product to monitor the data sets for unauthorized edits and changes (Option C) would not be an appropriate course of action for verifying that a user's data is not altered without their consent. DLP products can help protect sensitive data from loss or theft, but they do not provide a means to verify the integrity of the data or detect unauthorized changes.
upvoted 5 times
...
Stiobhan
2 years, 1 month ago
Selected Answer: A
So the give away here is "verify that a user's data is not altered without the user's consent" Answer A will not allow changes unless user has been verified (logged on and authenticated), answer C will only monitor the situation and report if a change is made, that is not what the CISO is requesting!
upvoted 4 times
...
IanRogerStewart
2 years, 2 months ago
Selected Answer: A
The idea of using DLP to monitor data at rest on a server is just nonsensical. This Q has nothing to do with Confidentiality (what DLP is about), it is about Integrity. Hashing is 100% your solution.
upvoted 3 times
...
JohnMangley
2 years, 2 months ago
Selected Answer: A
What can DLP Prevent? Data Loss Prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data. Organizations use DLP to protect and secure their data and comply with regulations. Correct me if I am wrong, but so far as the info online shows, DLP does not really compare the before and after data for alteration checks. https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/#:~:text=Data%20Loss%20Prevention%20(DLP)%20is,data%20and%20comply%20with%20regulations.
upvoted 3 times
...
absabs
2 years, 2 months ago
Selected Answer: C
I going with C because it seems more sysmatic. suit for comptia.
upvoted 1 times
...
david124
2 years, 3 months ago
Selected Answer: A
Chat GPT says A
upvoted 4 times
HereToStudy
2 years ago
It also says C
upvoted 3 times
...
...
xyz47
2 years, 3 months ago
This is tough question due to the fact is not precisely asked. I think the correct answer is A. Why? The CISO tasked a security analyst to find a control function to 'verify' that a user's data is not altered without the user's consent. DLP is more about preventing alteration, and it is more about preventing data leak or exfiltration outside of the company. It is frequently connected to sensitive data. If the question is only about verification answer A should be enough. Also I am not sure how good DLP is with tracking the file changes expecially changes performed by the authorized users from inside of the company's network. I guess if system administrator makes a change this change is also authorized, but still it was done without user's consent. I guess DLP won't do anything about such a change.
upvoted 2 times
...
mrodmv
2 years, 4 months ago
Selected Answer: C
https://www.crowdstrike.com/cybersecurity-101/data-loss-prevention-dlp/
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago