exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 10 discussion

Actual exam question from CompTIA's CS0-002
Question #: 10
Topic #: 1
[All CS0-002 Questions]

A Chief Executive Officer (CEO) is concerned the company will be exposed to data sovereignty issues as a result of some new privacy regulations. To help mitigate this risk, the Chief Information Security Officer (CISO) wants to implement an appropriate technical control. Which of the following would meet the requirement?

  • A. Data masking procedures
  • B. Enhanced encryption functions
  • C. Regular business impact analysis functions
  • D. Geographic access requirements
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Laudy
Highly Voted 2 years, 7 months ago
Selected Answer: D
Data Sovereignty means that data is subject to the laws and regulations of the geographic location where that data is collected and processed. Data sovereignty is a country-specific requirement that data must remain within the borders of the jurisdiction where it originated. At its core, data sovereignty is about protecting sensitive, private data and ensuring it remains under the control of its owner. You're only worried about that if you're in multiple locations. Hence the best answer is D. https://www.virtru.com/blog/gdpr-data-sovereignty-matters-globally
upvoted 25 times
bootleg
2 years, 6 months ago
If the question would've said (INTEGRITY) then you think encryption. Geo is absolutely locale. Move the instance to a location in which you have control.
upvoted 2 times
Goat54
2 years, 2 months ago
Integrity=hashing Confidentiality=encryption
upvoted 5 times
...
...
kopib21961
2 years, 4 months ago
D is correct. Also because data sovereignty would not restrict certain customers from doing business with an organization. Geographic access requirements could block potential customers from accessing an organization ’ s resources from within a geographic location.
upvoted 1 times
...
2Fish
2 years, 1 month ago
Agree. D is the correct answer here.
upvoted 2 times
...
...
DerekM
Most Recent 1 year, 11 months ago
Selected Answer: D
To mitigate the risk of data sovereignty issues resulting from new privacy regulations, the Chief Information Security Officer (CISO) should implement geographic access requirements (option D). Geographic access requirements involve implementing technical controls that ensure data is stored and accessed only within specific geographic regions or jurisdictions. This control helps address concerns related to data sovereignty by ensuring that data is stored and processed in compliance with the applicable regulations of the specific regions where the data is located.
upvoted 1 times
...
JokerRWild
2 years ago
Selected Answer: D
D. Geographic access requirements would help mitigate the risk of data sovereignty issues. This control would ensure that data is only accessible from approved geographic locations, helping to ensure the data sovereignty of certain countries or regions is maintained. Data masking procedures, enhanced encryption functions, and regular business impact analysis functions can help address other types of risks, but would not specifically address data sovereignty concerns.
upvoted 2 times
...
1oldman
2 years ago
Technical controls consist of the hardware and software components that protect a system against cyberattack. Firewalls, intrusion detection systems (IDS), encryption, and identification and authentication mechanisms are examples of technical controls.
upvoted 2 times
...
Snkrsnaker1
2 years ago
Answer is B Think along the lines of...Geo access requirements is just that, an access control based on geolocation. It doesn't actually protect data. The most widely accepted meaning to Data sovereignty refers to the understanding that data which are stored outside of an organizations host country and still subject to the laws in the country where the data is stored. How this question is asked, the answer is B. Data sovereitny has nothing to do with where its accessed but more of how the data is protected based on their laws. Hope this helps.
upvoted 4 times
...
josbornx
2 years, 1 month ago
To mitigate the risk of data sovereignty issues, the appropriate technical control would be D. Geographic access requirements. This control ensures that data is only stored and processed in geographic locations that comply with relevant privacy regulations, thereby reducing the risk of the company being exposed to such issues. Option A, data masking procedures, is a technique used to obfuscate sensitive data in a system, but it may not be sufficient to address the specific concerns related to data sovereignty. Option B, enhanced encryption functions, can be an effective control to protect data confidentiality, but it may not necessarily address the concerns related to data sovereignty. Option C, regular business impact analysis functions, are an important aspect of risk management but are not directly related to addressing data sovereignty issues. Therefore, option D is the best choice to help mitigate the risk of data sovereignty issues. ChatGPT
upvoted 2 times
uday1985
1 year, 11 months ago
Dude! dont rely on ChatGPT! it gave me wrong answers 50% of the times!
upvoted 3 times
...
...
kiduuu
2 years, 1 month ago
Selected Answer: D
Data masking procedures (option A) can be used to protect sensitive data by replacing it with fictitious data, but it does not address the issue of data sovereignty. Enhanced encryption functions (option B) can be used to protect sensitive data, but it does not address the issue of data sovereignty directly. Regular business impact analysis functions (option C) are important for identifying potential risks and developing mitigation strategies, but it does not address the issue of data sovereignty. Therefore, option D. Geographic access requirements would be the most appropriate technical control to implement to address the CEO's concern about data sovereignty issues resulting from new privacy regulations.
upvoted 2 times
...
DrVoIP
2 years, 2 months ago
B. Enhanced encryption functions would be an appropriate technical control to help mitigate the risk of data sovereignty issues due to new privacy regulations. -ChatGPT
upvoted 1 times
...
boletri
2 years, 2 months ago
Geographic Access Requirements Geographic access requirements fall into two different scenarios. Storage locations might have to be carefully selected to mitigate data sovereignty issues. Most cloud providers allow choice of data centers for processing and storage, ensuring that information is not illegally transferred from a particular privacy jurisdiction without consent. Employees needing access from multiple geographic locations. Cloud-based file and database services can apply constraint-based access controls to validate the user's geographic location before authorizing access. Oficial Comptia Cysa+ Course Material.
upvoted 1 times
...
AaronS1990
2 years, 2 months ago
Selected Answer: D
D. Sovereignty refers to location specific governance
upvoted 1 times
...
Cock
2 years, 2 months ago
Selected Answer: D
D. In the UK, you need to give permissions to cookies
upvoted 1 times
...
zainulimtiaz
2 years, 2 months ago
The Chief asked for technical control. Encryption is a technical control, not option D
upvoted 3 times
...
catastrophie
2 years, 2 months ago
The correct answer is D. You can encrypt and mask the data all you want, however, the issue lies within the location in which the data is contained. For example, the UK has a strict privacy regulation called General Data Protection Regulation (GDPR) which protects their citizens PII and data rights. Under this regulation, only countries with verified similar regulations can store data on UK citizens. The United States cannot because we do not have federal regulations to protect the individual rights of data privacy. This is an example of type Geographical access requirements based on a sovereignty privacy regulation.
upvoted 3 times
...
omer123456
2 years, 3 months ago
Selected Answer: D
D is correct
upvoted 1 times
...
albano23412415
2 years, 4 months ago
Selected Answer: B
They are saying the data will be exposed due to new privacy rules. Using encryption to protect data against prying eyes. If a foreign government demands that a cloud provider give them access to your data, they won't be able to read it if you hold the decryption key.
upvoted 3 times
...
Cyril_the_Squirl
2 years, 4 months ago
B is correct. The CISO wants to apply Technical Controls, B is correct. D is wrong because it's an Adminstrative or Managerial Control. https://csrc.nist.gov/glossary/term/Technical_Controls
upvoted 2 times
1oldman
2 years ago
Correct. Technical controls consist of the hardware and software components that protect a system against cyberattack. Firewalls, intrusion detection systems (IDS), encryption, and identification and authentication mechanisms are examples of technical controls.
upvoted 1 times
...
...
sho123
2 years, 5 months ago
Selected Answer: B
there is always an access control but i haven't seen the words like Geographic access requirements in cybersecurity. so the next answer should be enhance encryption. i
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago