CySA+ CS0-001 – Q. 389


After reviewing security logs, it is noticed that sensitive data is being transferred over an insecure network. Which of the following would a cybersecurity analyst BEST recommend that the organization implement?

A. Use a VPN
B. Update the data classification matrix.
C. Segment the networks.
D. Use FIM.
E. Use a digital watermark.