Which two parameters are used to prevent a data breach in the cloud? (Choose two.)
Which two parameters are used to prevent a data breach in the cloud? (Choose two.)
Data Loss Prevention (DLP) solutions and encryption are two of the most effective parameters for preventing data breaches in the cloud. DLP solutions monitor and control the flow of sensitive data, identifying and blocking unauthorized access to prevent breaches. Encryption protects data by making it unreadable to unauthorized users both in transit and at rest, ensuring that even if data is intercepted or accessed without permission, it remains secure.
C E - https://www.otava.com/blog/7-ways-to-prevent-data-leaks-in-the-cloud/ Here are seven good ways to make sure that your cloud data is secure: E ---> Use good quality encryption, both on stored data and connections. ... Educate employees about phishing. ... C ----> Use two-factor authentication. ... Have a decent password policy. ... Set correct user permissions. ... Keep backups. ... Use the right cloud provider. here: https://www.getkisi.com/blog/7-tips-prevent-cloud-security-threats and here: https://charlesphillips.me/5-of-the-best-ways-to-prevent-or-mitigate-a-cloud-data-breach/#:~:text=5%20of%20the%20Best%20Ways%20to%20Prevent%20or,5.%20Devise%20a%20data%20breach%20response%20plan.%20
A. DLP solutions and E. Encryption To prevent a data breach in the cloud, the following parameters can be used: 1. DLP solutions: Data Loss Prevention (DLP) solutions can be used to monitor and control the flow of sensitive data in the cloud. DLP solutions can detect and prevent data breaches by identifying and blocking unauthorized access to sensitive data. 2. Encryption: Encryption can be used to protect data in transit and at rest in the cloud. Encryption ensures that data is unreadable to unauthorized users even if it is intercepted or stolen. Complex cloud-based web proxies, strong user authentication, and antispoofing programs are important security measures, but they are not specifically used to prevent data breaches in the cloud.
Strong user authentication is does not prevent data breach? No ? if you have weak user authentication (weak password, no MFA), login is breached by eg. dictionary attack, attacker has access, say good bye to your data...
"A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so." - - -Strong user authentication like 2FA can prevent this.
B, C, D are also important security measures, but they do not directly prevent data breaches in the cloud.
I'll go with AC :)
You keep changing your mind with every question. Stop it
I think: AE
DLP already do the encryption A,C are correct
How is DLP involved with encryption? Go hit the books youngblood
strong user authentication is not a parameter.
C&E is Correct: encryption is one of the top five methods to prevent data breach in the cloud Two-factor authentication and secure access solutions for cloud apps make it more difficult for malicious hackers or insiders to compromise users, including those who work remotely or on a contract basis
Please disregard my other answer. I'd go with C and E. https://www.otava.com/blog/7-ways-to-prevent-data-leaks-in-the-cloud/
Question asks about how to prevent a data breach. In that case I'd say E is incorrect, because encryption doesn't help prevent a data breach. The data can be breached, but if the data can't be decrypted, it will be useless to the malicious actor.
What about Mitm?
A and C are correct as E is Encryption which will not prevent
A and E look good to me.
Horrible slate of answers to this question. If you search how to prevent a data breach in the cloud, you get encryption, cloud DLP, MFA, and a slew of other answers. For this one, I gotta go with DLP and Encryption because it just says strong user authentication. It doesn't say multi-factor authentication. Cisco exams suck.
If you have strong authentication, you can prevent your data is leaked. Even though you use encryption, this will not prevent that attacker from accessing your data, and it will be leaked anyway.
leaked encrypted data is inaccessible, that is the whole point of encryption. I also recommend to you to read a bite about cloud data masking and tokenization: https://cpl.thalesgroup.com/faq/data-security-in-the-cloud/how-do-i-ensure-the-cloud-provider-does-not-access-my-data And think a bit if you really would like the Cloud Provider to be able to access all your data? - rhetoric question ... remember that CLOUD is nothing more than someone else DC
you are right, thinking now, they ask about parameters, it should be C and E, DLP solutions are not a parameter
I am going with A and B. How come Strong AuthN (option C) prevent data breach if this operation is performed by the legitimate user himself ?
A,C is correct