QuestionApril 7, 2026

Protect student academic transcripts from unauthorized disclosure square Use tokenization for credit card transactions [Select] square Maintain audit logs for access to medical records [Select] square Notify users of a data breach affecting their personal data square v Limit access to educational records based on role [Select] square Store credit card data securely using encryption Select] square

Protect student academic transcripts from unauthorized disclosure square Use tokenization for credit card transactions [Select] square Maintain audit logs for access to medical records [Select] square Notify users of a data breach affecting their personal data square v Limit access to educational records based on role [Select] square Store credit card data securely using encryption Select] square
Protect student academic transcripts from unauthorized disclosure
square 
Use tokenization for credit card transactions [Select] square 
Maintain audit logs for access to medical records [Select] square 
Notify users of a data breach affecting their personal data
square  v
Limit access to educational records based on role [Select] square 
Store credit card data securely using encryption Select] square

Solution
4.0(224 votes)

Answer

1. Data confidentiality ### 2. Tokenization ### 3. Audit logging ### 4. Breach notification ### 5. Role-based access control (RBAC) ### 6. Data encryption Explanation 1. Match security controls to scenarios Match each scenario to its relevant security practice or principle. - **Protect student academic transcripts from unauthorized disclosure** → Data confidentiality - **Use tokenization for credit card transactions** → Tokenization - **Maintain audit logs for access to medical records** → Audit logging - **Notify users of a data breach affecting their personal data** → Breach notification - **Limit access to educational records based on role** → Role-based access control (RBAC) - **Store credit card data securely using encryption** → Data encryption

Explanation

1. Match security controls to scenarios<br /> Match each scenario to its relevant security practice or principle.<br /><br />- **Protect student academic transcripts from unauthorized disclosure** → Data confidentiality <br />- **Use tokenization for credit card transactions** → Tokenization <br />- **Maintain audit logs for access to medical records** → Audit logging <br />- **Notify users of a data breach affecting their personal data** → Breach notification <br />- **Limit access to educational records based on role** → Role-based access control (RBAC) <br />- **Store credit card data securely using encryption** → Data encryption
Click to rate:

Similar Questions