Notifications
Clear all
Topic starter
29/10/2022 11:55 pm
The threat modeling identifies a man-in-the-middle (MITM) exposure .
Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?
- A . Auditing
- B . Anonymization
- C . Privacy monitoring
- D . Data retention
Suggested Answer: B