- (Exam Topic 13)
What is the process of removing sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique?
Correct Answer:
A
- (Exam Topic 14)
The threat modeling identifies a man-in-the-middle (MITM) exposure. Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?
Correct Answer:
B
- (Exam Topic 11)
What is the MOST efficient way to secure a production program and its data?
Correct Answer:
B
- (Exam Topic 15)
What is the FIRST step for an organization to take before allowing personnel to access social media from a corporate device or user account?
Correct Answer:
A
- (Exam Topic 13)
Which of the following is a direct monetary cost of a security incident?
Correct Answer:
C