Tuesday, December 6, 2016

Protecting Sensitive Data

Protecting sensitive data is a significant concern for any organization so it's important to know the different methods used to do so. Check out this sample Security+ question.

Q. A security manager is reviewing security policies related to data loss. Which of the following is the security administrator MOST likely to be reviewing?

A. Clean desk policy

B. Separation of duties

C. Job rotation

D. Change management

Do you know why the incorrect answers are incorrect and why the correct answers are correct?

Check out the answer and explanation here.