Which method would most likely help a company find the cause of sensitive data being shared publicly?

Prepare for the CompTIA Security+ SY0-601 exam. Explore comprehensive flashcards and diverse multiple-choice questions with hints and explanations. Get exam-ready now!

Utilizing log analysis is a highly effective method for identifying the cause of sensitive data being shared publicly. Logs serve as detailed records of activity across networks, applications, and systems, documenting who accessed what data, when, and how. By examining these logs, an organization can track unauthorized access or data exfiltration incidents. This includes identifying specific user actions or anomalies that coincide with the times sensitive data was breached or leaked.

In contrast, checksums are primarily used for verifying data integrity by ensuring that data has not been altered or corrupted, which does not directly address identifying the cause of a data leak. Watermarks can act as deterrents to unauthorized sharing, helping trace or identify the source of a leak if the data is shared maliciously. However, they do not provide immediate insight into who accessed or transferred the sensitive info. Order of volatility refers to the sequence of data that should be collected during forensic analysis, which is important for preserving evidence but not specifically for investigating past incidents of data exposure.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy