Why A? Digital watermarking can provide an additional layer of security for content protection by deterring illegal use and duplication.
Because they are digital, these types of watermarks can be read and deciphered by computers, making it easier to validate original content and possibly trigger actions to forestall illegal dissemination.
Ultimately, this copyright protection prevents brand erosion.
In addition to protecting intellectual property and copyrighted material, digital watermarks can also help organizations prevent the unauthorized transfer, copying, or retrieval of company documents. This is especially crucial when malware or a malicious actor is seeking to remove high-value documents from an organization.
Answer: A
appears to be the MOST relevant preventive control among the options provided. Digital watermarks can be embedded within data files to uniquely identify them, making it easier to trace and attribute leaked data back to its source, thus acting as a deterrent against unauthorized sharing or leakage.
How does a watermark prevent someone from leaking data? Like you said, it helps trace back to the source. It does nothing to prevent it from actually happening.
Selected Answer is A
Digital watermarks are a form of data protection that embeds information directly into digital content, such as files, images, or documents. They are often invisible or difficult to remove, making it harder for unauthorized individuals to manipulate or leak the data without detection. This control helps in tracking and identifying the source of potential leaks, as the watermarks can indicate the origin of the data.
how is A a preventative measure? it can help identify the source of leaked data but it doesn't prevent. It's either B or C and I am skewing more towards B.
An IS auditor would recommend ensuring that paper documents are disposed of securely as the most effective preventive control to reduce the risk of data leakage.
Option A, validating that all data files contain digital watermarks, is a detective control that helps identify the source of data leaks after they occur, but it does not prevent them.
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
9967be3
1 week, 5 days ago1e71ed5
9 months, 2 weeks agoa84n
1 year agochoboanon
7 months, 1 week ago001Yogesh
1 year, 4 months ago3008
1 year, 5 months agoJacCISA
1 year, 8 months agocidigi
1 year, 8 months agostarzuu
1 year, 9 months agostarzuu
1 year, 9 months agoBabaP
2 years agoSRJ13
2 years, 1 month agoMunaM
2 years, 7 months ago