Multiple Choice
A security analyst is classifying data based on input from data owners and other stakeholders. The analyst has identified three data types: Financially sensitive data Project data Sensitive project data The analyst proposes that the data be protected in two major groups, with further access control separating the financially sensitive data from the sensitive project data. The normal project data will be stored in a separate, less secure location. Some stakeholders are concerned about the recommended approach and insist that commingling data from different sensitive projects would leave them vulnerable to industrial espionage. Which of the following is the BEST course of action for the analyst to recommend?
A) Conduct a quantitative evaluation of the risks associated with commingling the data and reject or accept the concerns raised by the stakeholders.
B) Meet with the affected stakeholders and determine which security controls would be sufficient to address the newly raised risks.
C) Use qualitative methods to determine aggregate risk scores for each project and use the derived scores to more finely segregate the data.
D) Increase the number of available data storage devices to provide enough capacity for physical separation of non-sensitive project data.
Correct Answer:

Verified
Correct Answer:
Verified
Q290: An organization wants to arm its cybersecurity
Q291: The Chief Information Security Officer (CISO) of
Q292: A company is migrating systems from an
Q293: As a result of an acquisition, a
Q294: A forensic analyst suspects that a buffer
Q296: A company has decided to lower costs
Q297: An electric car company hires an IT
Q298: A systems administrator has deployed the latest
Q299: A newly hired Chief Information Security Officer
Q300: A penetration test is being scoped for