Which countermeasur...
 
Notifications
Clear all

Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?

1 Posts
1 Users
0 Likes
207 Views
(@soquirandolph)
Noble Member
Joined: 2 years ago
Posts: 729
Topic starter  

The threat modeling identifies a man-in-the-middle (MITM) exposure .

Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?

  • A . Auditing
  • B . Anonymization
  • C . Privacy monitoring
  • D . Data retention

Show Answer Hide Answer

Suggested Answer: B

   
Quote

Latest ISC CISSP Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: