
Microsoft Cybersecurity Architect Expert SC-100
Get started today
Ultimate access to all questions.
As a Microsoft Cybersecurity Architect, you are tasked with designing a solution for a financial services organization that processes personal data of European Union (EU) citizens. The organization must comply with the EU's ePrivacy Directive, which requires strict handling and protection of personal data. The solution must ensure compliance by addressing data discovery, access control, and monitoring to prevent unauthorized access or disclosure. Additionally, the solution should be scalable to accommodate future growth and must not incur unnecessary costs. Considering these requirements, which of the following approaches using Microsoft Priva would BEST ensure compliance with the ePrivacy Directive? (Choose one option)
As a Microsoft Cybersecurity Architect, you are tasked with designing a solution for a financial services organization that processes personal data of European Union (EU) citizens. The organization must comply with the EU's ePrivacy Directive, which requires strict handling and protection of personal data. The solution must ensure compliance by addressing data discovery, access control, and monitoring to prevent unauthorized access or disclosure. Additionally, the solution should be scalable to accommodate future growth and must not incur unnecessary costs. Considering these requirements, which of the following approaches using Microsoft Priva would BEST ensure compliance with the ePrivacy Directive? (Choose one option)
Explanation:
Option C is the most comprehensive and appropriate solution for ensuring compliance with the ePrivacy Directive using Microsoft Priva. It addresses the critical requirements of data discovery, access control, and monitoring, which are essential for demonstrating compliance. While options A, B, and D contribute to security and compliance, they do not fully encompass the specific requirements of the ePrivacy Directive as comprehensively as option C. Option C ensures that all personal data is accounted for, access is strictly controlled, and compliance can be demonstrated, making it the best choice for the organization's needs.