A. Possible noncompliant activities that lead to data disclosure
Continuous monitoring of access controls is crucial in detecting activities that may be noncompliant with organizational policies and could potentially lead to unauthorized access or disclosure of sensitive data. This kind of monitoring helps in identifying instances where access privileges may be misused or where there are attempts to access resources in violation of established security protocols. By detecting these activities in real-time or near real-time, organizations can respond quickly to mitigate the risks associated with data breaches or unauthorized data disclosure.
A. possible noncompliant activities that lead to data disclosure
Continuous monitoring of access controls allows organizations to detect any unusual activity or violations in real time. It can spot unauthorized access or noncompliant activities that could potentially lead to data disclosure, hence preventing data breaches or any other types of unauthorized information access. Other options are beneficial aspects of a comprehensive security program, but they are not the primary benefits of monitoring access controls specifically.
Tricky question. Going with "A". I believe the keyword here "which option has the greatest impact if access controls failed !". Sensitive data disclosure would lead to significant impact more than other options. Option "D" makes sense but most of the organizations concerns about data leakage /disclosure.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Kennethlim79
1 month, 1 week ago01010100
5 months, 2 weeks agomraiyan
7 months, 1 week ago[Removed]
8 months, 1 week agojohn_boogieman
11 months, 1 week agoKoulyo
9 months, 1 week agoaselunar
2 years, 7 months agoKhy
2 years, 9 months ago