Which of the following would a cybersecurity analyst BEST recommend that the organization implement?

Posted by: Pdfprep Category: CS0-001 Tags: , ,

After reviewing security logs, it is noticed that sensitive data is being transferred over an insecure network.

Which of the following would a cybersecurity analyst BEST recommend that the organization implement?
A . Use a VPN
B . Update the data classification matrix.
C . Segment the networks.
D . Use FI
F . Use a digital watermark.

Answer: A

Leave a Reply

Your email address will not be published.