ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 142 - CISSP discussion

Report
Export

The use of strong authentication, the encryption of Personally Identifiable Information (PII) on database servers, application security reviews, and the encryption of data transmitted across networks provide

A.
data integrity.
Answers
A.
data integrity.
B.
defense in depth.
Answers
B.
defense in depth.
C.
data availability.
Answers
C.
data availability.
D.
non-repudiation.
Answers
D.
non-repudiation.
Suggested answer: B
asked 18/09/2024
Carola Lotito
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first