After recovering from a data breach in which customer data was lost, the legal team meets with the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data. Which of the following controls support this goal?

A. Contingency planning
B. Encryption and stronger access control
C. Hashing and non-repudiation
D. Redundancy and fault tolerance


Answer: B. Encryption and stronger access control

Computer Science & Information Technology

You might also like to view...

Where is the Show Formulas command found?

A) Formula Auditing group on the Formulas tab B) Formula Auditing group on the Data tab C) Formula Auditing group on the Developer tab D) Formula Auditing group on the Review tab

Computer Science & Information Technology

ActionScript 4.0, introduced in 2009, is the latest version of the ActionScript programming language.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Some of the key factors in database design are content, access, structure, archiving, and security.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Meredith frequently develops new applications that improve her performance and then tests them out. This shows her ________ skills.

A. abstract reasoning B. Experimentation C. systems thinking D. problem-solving

Computer Science & Information Technology