
Answer-first summary for fast verification
Answer: Encryption first, followed by access controls, then threat detection.
While all three components are crucial, encryption should be prioritized first as it provides a foundational layer of security that protects data at rest and in transit. Access controls are next as they manage who can access the data, and threat detection is important but should be prioritized after ensuring data is encrypted and access is controlled.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
You are tasked with specifying priorities for mitigating threats to data in your organization. Given the diverse data types and storage solutions used, how would you rank the importance of encryption, access controls, and threat detection in your strategy?
A
Encryption first, followed by access controls, then threat detection.
B
Access controls first, then encryption, with threat detection as a secondary concern.
C
Threat detection as the primary focus, with encryption and access controls equally important.
D
Equal priority for all three, as they are all critical components.
No comments yet.