Which of the follow...
 
Notifications
Clear all

Which of the following should the security analyst recommend to BEST control the unauthorized disclosure of sensitive data when sharing the development database with the vendor?

1 Posts
1 Users
0 Likes
243 Views
(@finnecolton)
Noble Member
Joined: 2 years ago
Posts: 729
Topic starter  

A company has contracted with a software development vendor to design a web portal for customers to access a medical records database.

Which of the following should the security analyst recommend to BEST control the unauthorized disclosure of sensitive data when sharing the development database with the vendor?

  • A . Establish an NDA with the vendor.
  • B . Enable data masking of sensitive data tables in the database.
  • C . Set all database tables to read only.
  • D . Use a de-identified data process for the development database.

Show Answer Hide Answer

Suggested Answer: B

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: