
Microsoft Cybersecurity Architect Expert SC-100
Get started today
Ultimate access to all questions.
You are tasked with specifying priorities for mitigating threats to data in your organization. Given the diverse data types and storage solutions used, how would you rank the importance of encryption, access controls, and threat detection in your strategy?
You are tasked with specifying priorities for mitigating threats to data in your organization. Given the diverse data types and storage solutions used, how would you rank the importance of encryption, access controls, and threat detection in your strategy?
Simulated
Explanation:
While all three components are crucial, encryption should be prioritized first as it provides a foundational layer of security that protects data at rest and in transit. Access controls are next as they manage who can access the data, and threat detection is important but should be prioritized after ensuring data is encrypted and access is controlled.