View all questions & answers for the CPIM-8.0 exam
Which of the following techniques is BEST suited to preserve the confidentiality of a system’s data?
Audit log review
Database encryption
Immutable backups
Database record locking
Submit