answers, 100% Accurate. Graded A+
An organization is implementation g a preselected baseline of security controls but finds that some of
the controls aren't relevant to their needs. What should they do - ✔✔-Tailor the baseline to their
requirements
An admin is planning to deploy a database server and wants to ensure it is secure. She reviews a list of
baseline security controls and identifies the security controls that apply to this database server. What is
it called - ✔✔-Scoping
A data policy mandates teh use of watermarks on photos created by an organization. Which one of the
following best describes the reason for this policy - ✔✔-To detect the unauthorized copying of the
photos
You recently wrote and published a book on how to pass the CISSP exam. you want to protect your
rights under copyright law. Which of the following would you use - ✔✔-DRM -digital rights management
Management is concerned that users may copy sensitive data onto usb devices. You're asked what
technology will protect this activity. Which of the following is the most cost effective to implement -
✔✔-DLP - digital loss prevention
CASB - ✔✔-Cloud Access Security Broker
A hospital maintains patient medical records. Management has decided to modify all the records by
replacing the patient names with a patient number. A separate database holds the mapping for each
patient number to the correct patient name so that the hospital can retrieve the original data
What does this describe - ✔✔-Pesudonymization
Admins routinely connect to servers in teh data center from remote locations using their admin
accounts. What should be a prime concern when doing so - ✔✔-Protecting data in transit