Page 356 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 356

Written Lab


                1.  Describe PII and PHI.

                2.  Describe the best method to sanitize SSDs.

                3.  Describe pseudonymization.


                4.  Describe the difference between scoping and tailoring.
   351   352   353   354   355   356   357   358   359   360   361