Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 49 Topic 5 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 49 Topic 5 Discussion

312-49v11 Exam Topic 5 Question 49 Discussion:
Question #: 49
Topic #: 5

In a financial institution ' s computer forensic investigation, suspicious activity reveals unauthorized access to GLBA (Gramm-Leach-Bliley Act)-protected customer data, raising concerns for customer safety. However, identifying the breach ' s source and extent poses significant challenges, complicating compliance with GLBA guidelines.

What steps should be taken in a GLBA-covered computer forensic investigation when unauthorized access to sensitive customer data is discovered?


A.

Ignore the incident if it does not directly threaten financial activities.


B.

Share information with third parties for analysis.


C.

Inform law enforcement without notifying affected customers.


D.

Notify affected customers of opt-out rights and safeguard data.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.