ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 153 - SK0-005 discussion

Report
Export

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

A.
Restore the data from backup.
Answers
A.
Restore the data from backup.
B.
Disclose the incident.
Answers
B.
Disclose the incident.
C.
Disable unnecessary ports.
Answers
C.
Disable unnecessary ports.
D.
Run an antivirus scan.
Answers
D.
Run an antivirus scan.
E.
Identify the exploited vulnerability.
Answers
E.
Identify the exploited vulnerability.
F.
Move the data to a different location.
Answers
F.
Move the data to a different location.
Suggested answer: B, E

Explanation:

These are two measures that should be taken when a data breach occurs. A data breach is an unauthorized or illegal access to confidential or sensitive data by an internal or external actor. A data breach can result in financial losses, reputational damage, legal liabilities, and regulatory penalties for the affected organization. Disclosing the incident is a measure that involves informing the relevant stakeholders, such as customers, employees, partners, regulators, and law enforcement, about the nature, scope, and impact of the data breach. Disclosing the incident can help to mitigate the negative consequences of the data breach, comply with legal obligations, and restore trust and confidence. Identifying the exploited vulnerability is a measure that involves investigating and analyzing the root cause and source of the data breach. Identifying the exploited vulnerability can help to prevent further data loss, remediate the security gaps, and improve the security posture of the organization. Restoring the data from backup is a measure that involves recovering the lost or corrupted data from a secondary storage device or location. However, this does not address the underlying issue of how the data breach occurred or prevent future breaches. Disabling unnecessary ports is a measure that involves closing or blocking network communication endpoints that are not required for legitimate purposes. However, this does not address how the data breach occurred or what vulnerability was exploited. Running an antivirus scan is a measure that involves detecting and removing malicious software from a system or network. However, this does not address how the data breach occurred or what vulnerability was exploited. Moving the data to a different location is a measure that involves transferring the data to another storage device or location that may be more secure or less accessible. However, this does not address how the data breach occurred or what vulnerability was exploited. Reference: https://www.howtogeek.com/428483/what-is-end-to-endencryption- and-why-does-it-matter/ https://www.howtogeek.com/202794/what-is-the-differencebetween- 127.0.0.1-and-0.0.0.0/ https://www.howtogeek.com/443611/how-to-encrypt-your-macssystem- drive-removable-devices-and-individual-files/

asked 02/10/2024
Roger Wehrli
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first