
Answer-first summary for fast verification
Answer: Specify comprehensive security requirements for the email service, including advanced email filtering, spam and phishing protection, data loss prevention (DLP), and compliance with industry standards, ensuring the solution is scalable and cost-effective.
In a highly regulated industry, it is crucial to specify comprehensive security requirements for the cloud-based email service to ensure the protection of sensitive information and compliance with data protection standards. This includes implementing advanced email filtering, spam and phishing protection, and data loss prevention measures. Additionally, the solution must be scalable and cost-effective to accommodate future growth. Relying solely on the provider's security measures or focusing only on network and endpoint security does not fully address the potential security risks and compliance requirements. Implementing MFA and encryption is important but not sufficient without additional security features.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company is transitioning to a cloud-based email service to enhance employee productivity and collaboration. As the Cybersecurity Architect, you are tasked with ensuring the security of email communications. The company operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must be cost-effective and scalable to accommodate future growth. Considering these constraints, which of the following approaches BEST addresses the security requirements for the email service? (Choose one option)
A
Implement multi-factor authentication (MFA) and end-to-end encryption for all email communications, without considering additional security features due to budget constraints.
B
Specify comprehensive security requirements for the email service, including advanced email filtering, spam and phishing protection, data loss prevention (DLP), and compliance with industry standards, ensuring the solution is scalable and cost-effective.
C
Focus solely on securing the network infrastructure and endpoints used to access the email service, assuming the cloud provider's security measures are sufficient for email protection.
D
Rely exclusively on the email service provider's built-in security features, without implementing any additional security controls, to minimize costs and simplify management.
No comments yet.