Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email, but she
is worried about the confidentiality of the information. Which of the following will accomplish this task
securely?
Which of the following type of training would prevent Ann and other employees from becoming victims to such at
Ann a technician received a spear-phishing email asking her to update her personal information by
clicking the link within the body of the email. Which of the following type of training would prevent Ann
and other employees from becoming victims to such attacks?
End-user awareness training for handling sensitive personally identifiable information would include secure st
End-user awareness training for handling sensitive personally identifiable information would include
secure storage and transmission of customer:
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following concepts is a term that directly relates to customer privacy considerations?
Which of the following policies is implemented in order to minimize data loss or theft?
Which of the following policies is implemented in order to minimize data loss or theft?
which of the following are PII?
Used in conjunction, which of the following are PII? (Select TWO).
Which of the following helps to apply the proper security controls to information?
Which of the following helps to apply the proper security controls to information?
Which of the following security awareness training is BEST suited for data owners who are concerned with prote
Which of the following security awareness training is BEST suited for data owners who are concerned
with protecting the confidentiality of their data?
Which of the following activities should occur to prevent this in the future?
An organization is recovering data following a datacenter outage and determines that backup copies of
files containing personal information were stored in an unsecure location, because the sensitivity was
unknown. Which of the following activities should occur to prevent this in the future?
What is the term for the process of luring someone in (usually done by an enforcement officer or a government
What is the term for the process of luring someone in (usually done by an enforcement officer or a
government agent)?
