Storing sensitive data only when necessary is a guideline that helps to minimize the risk of data exposure or compromise. This guideline is based on the principle of data minimization, which means that organizations should only collect, process, and store the minimum amount of data necessary to accomplish their business objectives. By following this guideline, organizations can reduce the potential for data breaches, unauthorized access, and other security incidents that may result in the exposure of sensitive information.
It is important for end-users to be aware of the risks associated with sensitive data and the various methods of attacks that may be used to compromise it. However, this guideline alone may not be sufficient to prevent the exposure of sensitive data.
D. Store sensitive data only when necessary would be the BEST guideline to follow when attempting to avoid the exposure of sensitive data. Storing sensitive data only when it is necessary means limiting the amount of sensitive data stored, reducing the risk of data breaches, and minimizing the impact of such breaches. It is important to minimize the amount of sensitive data stored by identifying what data is truly necessary for business operations, and to store it in a secure location that is protected with strong access controls and encryption. Other measures like monitoring mail servers, educating end-users, and establishing report parameters are important, but they are supplementary to the main principle of storing sensitive data only when it is needed.
A description of best practices or recommendations for achieving a specific policy goal.
if you implement option B you will achieve option D
Selected answer: B
Going with "B" as collection limitation does not protect your data from being exposed; it only limits how much sensitive data is exposed if you get hacked. The keywords in the question "guideline" and "attempting" tells you that they're trying to change user behavior since those users are the ones in touch of some of this sensitive data.
You can't rely on end-user to secure your org. YES educate them to not click on phishing emails, etc to change their behavior!
upvoted 1 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Cww1
Highly Voted 1 year, 5 months agojackdryan
10 months agofranbarpro
Highly Voted 1 year, 4 months agoNickolos
1 year, 3 months agohomeysl
Most Recent 4 months, 3 weeks ago74gjd_37
5 months, 2 weeks agoDJOEK
1 year, 2 months agoDelab202
1 year, 2 months agoringoru
1 year, 2 months agoJamati
1 year, 4 months agoWiDeBarulho
1 year, 4 months agoYanjun
1 year, 5 months agofranbarpro
1 year, 4 months ago