Digital SkillsHard

As a cybersecurity analyst in an EU delegation, you must design a protocol to protect sensitive data of third-country citizens that are processed in public cloud services of the European Union. The protocol must strictly align with the principles of the General Data Protection Regulation (GDPR) and the EU's security guidelines. Which of the following implementation measures is the MOST effective for ensuring data sovereignty and operational continuity in the face of a massive cyberattack that compromises the local infrastructure?

Want adaptive practice that measures your real level?

Start free preparation →

More Digital Skills questions

A digital project officer for the European External Action S...You are a digital communications officer for the European Ex...An EU delegation member needs to securely share a document c...As a digital security officer for an EU delegation participa...A junior diplomat in the European External Action Service (E...