Search Header Logo

InformationSecurity030

Authored by Rajendren Subramaniam

Specialty

Professional Development

Used 8+ times

InformationSecurity030
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data is an Asset

True

False

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

In order to construct an effective security plan, we need to look at how important the information is and draw some lines to separate by priority and importance. This process of categorization is known as the _____.

Data Classification

Information Classification

Value Classification

Technology Classification

Security Classification

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data must be properly classified, and there must be a way to apply a static identification. We call this _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The classified data will be assigned to appropriate roles to control and manage.

This is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

If someone has no clearance and attempt to obtain it, there must be a process to obtain it. This process is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A new user or role must have specific boundaries when accessing and dealing with data. This is also defined in the classification and labeling process and then informed to the users upon granting access. They must stay in the boundaries to accept the provided AAA for the actions they perform.

AAA represents _____, _____ and _____.

Accountablity

Accessibility

Approach

Authentication

Authorization

7.

MATCH QUESTION

2 mins • 1 pt

There are some important considerations when it comes to data classification.

Encryption

Roles and permissions

Disposal

Data must be kept, especially for future use and upon regulatory requirements.

Data Security

Depending on the type of data, regulatory requirements, and appropriate level of protection that must be ensured.

Data Retention

Data disposal is important as it can lead to leak information/data. There must be secure and standardized procedures.

Access privilege

Data can be at rest, in motion or being used . Each stage must be protected.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?