Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?
A.
Enforcement of a strict firewall policy to restrict access to the ERP system's server
B.
Configuration of the ERP system to disable all printing services on all workstations
C.
Implementation of regular backup and disaster recovery planning
The correct answer is D — Implementation of data encryption.
As per WGU Cybersecurity Architecture and Engineering (KFO1 / D488), encrypting data at rest ensures that even if attackers breach the system and obtain files, the data remains protected because it cannot be easily read without decryption keys.
Firewall enforcement (A) restricts access but does not protect data if stolen. Disabling printing services (B) limits data leakage but not core data protection. Backups (C) help with recovery, not immediate breach protection.
Reference Extract from Study Guide:
"Encrypting sensitive data ensures confidentiality even in the event of a security breach, protecting information from unauthorized exploitation."
— WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Data Security and Encryption Practices
=============================================
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit