{"id":366,"date":"2021-01-17T05:23:41","date_gmt":"2021-01-16T17:53:02","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question359\/"},"modified":"2021-01-17T05:24:10","modified_gmt":"2021-01-17T05:24:10","slug":"certified-information-systems-security-professional-cissp-question359","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question359\/","title":{"rendered":"Certified Information Systems Security Professional &#8211; CISSP &#8211; Question359"},"content":{"rendered":"<div class=\"question\">What is a consideration when determining the potential impact an organization faces in the event of the loss of confidentiality of Personally Identifiable Information (PII)? <br \/><strong><br \/>A.<\/strong> Quantity <br \/><strong>B.<\/strong> Availability <br \/><strong>C.<\/strong> Quality <br \/><strong>D.<\/strong> Criticality<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-122.pdf\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication8&#8230;<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is a consideration when determining the potential impact an organization faces in the event of the loss of confidentiality of Personally Identifiable Information (PII)? A. Quantity B. Availability C. Quality D. Criticality Show Answer Hide Answer Correct Answer: A Explanation: Reference: https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication8&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,391,362],"class_list":["post-366","post","type-post","status-publish","format-standard","hentry","category-certified-information-systems-security-professional-cissp","tag-certified-information-systems-security-professional-cissp","tag-choices","tag-question-359"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/366\/revisions"}],"predecessor-version":[{"id":756,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/366\/revisions\/756"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/media?parent=366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/categories?post=366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/tags?post=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}