New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27001-Lead-Implementer Exam - Topic 6 Question 6 Discussion

Actual exam question for PECB's ISO-IEC-27001-Lead-Implementer exam
Question #: 6
Topic #: 6
[All ISO-IEC-27001-Lead-Implementer Questions]

What should be used to protect data on removable media if data confidentiality or integrity are important considerations?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Glenna
4 months ago
Logging? That doesn't seem like a solid option.
upvoted 0 times
...
Gianna
4 months ago
I agree, encryption is a must for sensitive data.
upvoted 0 times
...
Junita
4 months ago
Wait, can you really rely on just backups?
upvoted 0 times
...
Tayna
4 months ago
A password alone isn't enough, right?
upvoted 0 times
...
Arlene
4 months ago
Definitely cryptographic techniques!
upvoted 0 times
...
Sherly
5 months ago
Logging seems irrelevant here; I believe the focus should be on encryption or cryptographic methods for securing data.
upvoted 0 times
...
Jarod
5 months ago
I practiced a question similar to this, and I think backup on another removable medium is more about redundancy than protection.
upvoted 0 times
...
Celestina
5 months ago
I'm not entirely sure, but I feel like a password might not be enough on its own.
upvoted 0 times
...
Alica
5 months ago
I think I remember something about using cryptographic techniques for data protection, especially for confidentiality.
upvoted 0 times
...
Keshia
5 months ago
Okay, I've got this. The key is to navigate to the Installed Operators section and select the Platform Navigator operator. From there, I believe the correct option is to select the latest channel version on the Subscription tab.
upvoted 0 times
...
Anissa
5 months ago
Wait, I'm a bit confused. If we have 5 partitions and 5 instances, shouldn't we only have 5 tasks created and 5 active? I'm not sure where the 25 is coming from.
upvoted 0 times
...
Carisa
5 months ago
Based on my understanding of Elasticsearch, I believe the correct answer is to configure the HTTP API to require authentication. This ensures that only authorized users can access the API, which is important for security.
upvoted 0 times
...

Save Cancel