In the deployment planning process, when should a person identify who gets to see network data?
In the deployment planning process, when should a person identify who gets to see network data?
In the deployment planning process, identifying who gets to see network data falls under data policy definition. The data policy defines access control, data protection, and data integrity requirements. It specifies who can access particular data elements, which is critical for ensuring that sensitive information is only available to authorized personnel and that data is managed according to compliance and regulatory requirements.
This should be D, as the data policy defines who can see what in the data...
Answer D • Data source inventory? – What is the superset of data sources needed by all users? – How much data is generated per day? • Data policy? – How long should each data source be retained? – Who can see particular data elements? – What data needs protection against tampering? – What proof of integrity needs to be provided? – Will Splunk be the primary repository for data?
pg 27 | Architecting
• D. Data policy definition
Answer is D, Data Policy definition
I believe C is correct: https://wiki.splunk.com/Community:CSA-AandD-DataSourcesInventory#:~:text=v1.2.doc-,Data%20Sources%20Inventory,be%20collected%20during%20deployment%20planning.&text=Env%20Environment%20where%20the%20data,Development%2C%20Production%2C%20etc.)