exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 166 discussion

Actual exam question from CompTIA's CS0-002
Question #: 166
Topic #: 1
[All CS0-002 Questions]

Due to a rise in cyber attackers seeking PHI, a healthcare company that collects highly sensitive data from millions of customers is deploying a solution that will ensure the customers' data is protected by the organization internally and externally. Which of the following countermeasures can BEST prevent the loss of customers' sensitive data?

  • A. Implement privileged access management.
  • B. Implement a risk management process.
  • C. Implement multifactor authentication.
  • D. Add more security resources to the environment.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jleonard_ddc
Highly Voted 2 years, 2 months ago
Selected Answer: A
The company wants to protect data inside and out (literally). The best way to do that is to limit who has privileges to which sets of data. (ie, least privilege – that customers only have access to their own data, etc.) WRONG ANSWERS • B – Risk management is done to evaluate vulnerabilities and prioritize their handling to reduce impact. We’re more concerned about sensitive data here than vulnerabilities. • C – MFA can help ensure the right people are accessing data but doesn’t guarantee users won’t leak data accidentally or that a solution will limit their access accordingly. • D – Similar to MFA, adding more security resources could protect access to the data but doesn’t ensure the data itself is safe. Besides, what exactly constitutes ‘security resources’?
upvoted 7 times
2Fish
2 years, 2 months ago
Agree. This is the best Answer from the ones given.
upvoted 2 times
...
...
PTcruiser
Highly Voted 2 years, 8 months ago
Selected Answer: C
A. Implement privileged access management - assumes the threat actor gains access to low privileged user in the org but what about the customer externally B. Implement a risk management process o Identifies, evaluates, and prioritizes threats and vulnerabilities to reduce their negative impact C. Implement multifactor authentication - is a solution that can work internally in the org and externally for the customers D. Add more security resources to the environment - doesnt ensure data protection going with C but this is a dumb question
upvoted 5 times
...
d8viey
Most Recent 1 year, 6 months ago
Selected Answer: C
The answer is not A because privileged users are not the only users that have access to sensitive data. So that implementation only affects a small subset of users. Deploying interal and external MFA, on the otherhand, would be a great enterprise-wide countermeasure for all users.
upvoted 1 times
...
kumax
1 year, 8 months ago
Selected Answer: A
ChatGPT: 1. Data Encryption 2. Access Controls 3. Multi-Factor Authentication (MFA) 4. Data Loss Prevention (DLP) Solutions 5. Endpoint Security 6. Network Security 7. Security Awareness Training 8. Incident Response Plan 9. Vendor Risk Management 10. Regulatory Compliance, etc.
upvoted 1 times
...
kyky
1 year, 11 months ago
Selected Answer: C
Given the scenario described, the countermeasure that would BEST prevent the loss of customers' sensitive data is option C: Implement multifactor authentication. Multifactor authentication (MFA) adds an extra layer of security by requiring users to provide multiple forms of identification before accessing sensitive data. This typically involves combining something the user knows (such as a password or PIN) with something the user has (such as a physical token or a mobile device) or something the user is (such as biometric data like a fingerprint or facial recognition). By implementing MFA, even if an attacker manages to obtain a user's password or credentials, they would still need access to the additional factor to successfully authenticate and access the data.
upvoted 1 times
...
Simpbizkit
2 years, 1 month ago
Selected Answer: A
I agree that A would protected user's data internally and externally because PAM would manage what privileged users can do with data
upvoted 1 times
...
kiduuu
2 years, 1 month ago
Selected Answer: C
In this case, implementing MFA for accessing sensitive data can help prevent unauthorized access even if the attacker manages to bypass other security measures. Privileged access management (A) and risk management process (B) are important security measures, but they do not directly prevent data loss.
upvoted 1 times
...
Stiobhan
2 years, 3 months ago
Selected Answer: A
Sometimes referred to as privileged identity management (PIM) or privileged access security (PAS), PAM is grounded in the principle of least privilege, wherein users only receive the minimum levels of access required to perform their job functions. The principle of least privilege is widely considered to be a cybersecurity best practice and is a fundamental step in protecting privileged access to high-value data and assets. By enforcing the principle of least privilege, organizations can reduce the attack surface and mitigate the risk from malicious insiders or external cyber attacks that can lead to costly data breaches. In summary, the less folk that have access to the PHI the less likely it is to be breached/abused etc.... https://www.cyberark.com/what-is/privileged-access-management/
upvoted 2 times
...
Eric1234
2 years, 3 months ago
Selected Answer: A
Going with A
upvoted 1 times
...
absabs
2 years, 3 months ago
focus on "protected by the organization internally and externally", so privileged access management
upvoted 1 times
...
CatoFong
2 years, 3 months ago
Selected Answer: A
Agree with Nick. 1. PAM is correct
upvoted 1 times
...
NickDrops
2 years, 4 months ago
Selected Answer: A
I think that it's A for 2 reasons. 1. I've never heard of MFA being used to turn on. 2. If it was an internal actor, MFA wouldn't stop anything because it would be an actual employee. proper access management would hopefully prevent external threat actors and definitely prevent internal ones.
upvoted 4 times
...
Tag
2 years, 7 months ago
Selected Answer: C
after careful review of the question ive decided that C is the most appropriate
upvoted 1 times
...
Adrian831
2 years, 8 months ago
Selected Answer: C
Thinking more about C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...