Which of the following controls can the organization implement to reduce the risk of similar breaches?

Posted by: Pdfprep Category: CAS-003 Tags: , ,

A company recently implemented a new cloud storage solution and installed the required synchronization client on all company devices. A few months later, a breach of sensitive data was discovered. Root cause analysis shows the data breach happened from a lost personal mobile device.

Which of the following controls can the organization implement to reduce the risk of similar breaches?
A . Biometric authentication
B . Cloud storage encryption
C . Application containerization
D . Hardware anti-tamper

Answer: A

Leave a Reply

Your email address will not be published.