
Ultimate access to all questions.
Your company is transitioning to a cloud-based email service to enhance employee productivity and collaboration. As the Cybersecurity Architect, you are tasked with ensuring the security of email communications. The company operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must be cost-effective and scalable to accommodate future growth. Considering these constraints, which of the following approaches BEST addresses the security requirements for the email service? (Choose one option)
A
Implement multi-factor authentication (MFA) and end-to-end encryption for all email communications, without considering additional security features due to budget constraints.
B
Specify comprehensive security requirements for the email service, including advanced email filtering, spam and phishing protection, data loss prevention (DLP), and compliance with industry standards, ensuring the solution is scalable and cost-effective.
C
Focus solely on securing the network infrastructure and endpoints used to access the email service, assuming the cloud provider's security measures are sufficient for email protection.
D
Rely exclusively on the email service provider's built-in security features, without implementing any additional security controls, to minimize costs and simplify management.