Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 223

An organization is moving its intellectual property data from on premises to a CSP and wants to secure the data from theft. Which of the following can be used to mitigate this risk?

    Correct Answer: A

    To secure intellectual property data from theft when moving it from on-premises to a cloud service provider, an additional layer of encryption is the most effective measure. Encryption ensures that even if the data is intercepted or accessed without authorization during or after the migration, it remains unreadable and secure. This method protects the data from being used maliciously, hence mitigating the risk of theft.

Discussion
OneSaintOption: A

Data should be encrypted for any migration to the cloud.

OneSaintOption: A

When data is being migrated from on-premises to Cloud, It should be encrypted .

ThatGuyOverThereOption: A

Encryption is the way to go. Data integrity is about the reliability of the data, not it being stolen. Ensuring the data is sufficiently encrypted means it should be inaccessible even if you miss something and some of the data gets out.

POWNEDOption: B

Your going to want to use a CASB, in other words B. Sucks that these last 100+ questions have little comments, and people commenting that do not know what they are talking about.

Luxury

Right the remainder of the exam dump is like this! I’m hoping my exam only includes the first 100.

Fragmenttt

Data integrity monitoring only ensures data is not changed on manipulated, has nothing to do with preventing theft.

POWNED

"Data integrity is often required by laws and regulations, such as HIPAA and GDPR, to protect sensitive information and prevent unauthorized access or manipulation of data."

POWNED

"Prevent unauthorized access" I would categorize that as preventing theft

SangSangOption: A

Homomorphic encryption, same with 221

BlingyOption: A

Data should be encrypted, so that even if it’s stolen, it will be useless because it cannot be decrypted.

CraZeeOption: A

Just a question...if the mitigation request is for theft, why is D not a consideration? I understand what POWNED said about B and the data integrity, but the way I read it, access to steal the data is different from access to read the data. A and B prevent the data from being accessed, but not stolen. C seems like a wasted option.

CraZee

From an online search: File Integrity Monitoring is a crucial tool for protecting sensitive data from cyber threats. By monitoring changes to files and alerting administrators to unauthorized changes, FIM can prevent cyber criminals from stealing or manipulating data. Still having difficulty seeing how it prevents theft, but seems like that is the answer...