✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
An attacker uses publicly available information to match anonymized patient records and infer a person’s illness. This is an example of:
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!