List of questions
Related questions
Question 142 - CISSP discussion
The use of strong authentication, the encryption of Personally Identifiable Information (PII) on database servers, application security reviews, and the encryption of data transmitted across networks provide
A.
data integrity.
B.
defense in depth.
C.
data availability.
D.
non-repudiation.
Your answer:
0 comments
Sorted by
Leave a comment first