A. Limited-retention, de-identified logs including only metadata.
Reasoning:
To prevent phishing attacks while minimizing data retention, retaining logs that include only metadata (and are de-identified) is the most appropriate option. This approach focuses on keeping the logs concise and non-sensitive, avoiding the storage of personal data and detailed content that could be a privacy risk. It ensures that essential information is retained for security analysis and incident investigation without holding onto more data than necessary
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ssourav
3 months, 2 weeks ago