Free CompTIA Security+ SY0-701 Practice Question

As a security architect, your company is expanding into new markets and is now subject to different regional regulations regarding data sovereignty. You need to ensure that customer data remains within legal borders according to these regulations. Which of the following methods would be the MOST effective to comply with these data sovereignty requirements?

  • Obfuscation

  • Hashing

  • Geographic restrictions

  • Encryption

  • Tokenization

  • Data masking

This question's topic:
CompTIA Security+ SY0-701 / 
Security Architecture
Your Score:

Check or uncheck an objective to set which questions you will receive.