Page 356 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 356
Written Lab
1. Describe PII and PHI.
2. Describe the best method to sanitize SSDs.
3. Describe pseudonymization.
4. Describe the difference between scoping and tailoring.