Which of the following is the BEST way to mitigate the risk of inappropriate access to personally identifiable information (PII) by third-party cloud service personnel? A. Utilize data encryption standards throughout the information life cycle B. Ensure security clearance is in place within the third-party hiring process C. Choose a third-party provider in a jurisdiction with few privacy regulations D. Include data security requirements in the service level agreement (SLA) Â Suggested Answer: D This question is in CRISC exam For getting Risk and Information Systems Control Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer