ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 114 - 312-40 discussion

Report
Export

Aidan McGraw is a cloud security engineer in a multinational company. In 2018, his organization deployed its workloads and data in a cloud environment. Aidan was given the responsibility of securing high-valued information that needs to be shared outside the organization from unauthorized intruders and hackers. He would like to protect sensitive information about his organization, which will be shared outside the organization, from attackers by encrypting the data and including user permissions inside the file containing this information. Which technology satisfies Aidan's requirements?

A.
Information Rights Management
Answers
A.
Information Rights Management
B.
Identity and Access Management
Answers
B.
Identity and Access Management
C.
System for Cross-Domain Identity Management
Answers
C.
System for Cross-Domain Identity Management
D.
Privileged User Management
Answers
D.
Privileged User Management
Suggested answer: A

Explanation:

Aidan McGraw's requirements to protect sensitive information shared outside the organization can be satisfied by Information Rights Management (IRM).

1.IRM Overview: IRM is a form of IT security technology used to protect documents containing sensitive information from unauthorized access. It does this by encrypting the data and embedding user permissions directly into the file1.

1.Encryption and Permissions: IRM allows for the encryption of the actual data within the file and includes access permissions that dictate who can view, edit, print, forward, or take other actions with the data. These permissions are enforced regardless of where the file is located, making it ideal for sharing outside the organization1.

1.Protection Against Attacks: By using IRM, Aidan ensures that even if attackers were to gain access to the file, they would not be able to decrypt the information without the appropriate permissions. This protects against unauthorized intruders and hackers1.

Strategies and Best Practices for Protecting Sensitive Data1.

Data security and encryption best practices - Microsoft Azure2.

What Is Cryptography? | IBM3.

asked 18/09/2024
Balvant Variya
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first