InformationSecurity030

InformationSecurity030

Professional Development

18 Qs

quiz-placeholder

Similar activities

PWW | Reports

PWW | Reports

7th Grade - Professional Development

15 Qs

HSSE Quiz 2020

HSSE Quiz 2020

Professional Development

20 Qs

Name the Aircraft

Name the Aircraft

Professional Development

16 Qs

WLD-112 Basic Welding (Plasma Cutting)

WLD-112 Basic Welding (Plasma Cutting)

11th Grade - Professional Development

20 Qs

YouTuber trivia (2021)

YouTuber trivia (2021)

KG - Professional Development

20 Qs

¿cuanto sabes de among us?

¿cuanto sabes de among us?

Professional Development

15 Qs

Creative Life Story Work

Creative Life Story Work

Professional Development

16 Qs

BukBer IT 2025 - Round 1

BukBer IT 2025 - Round 1

Professional Development

20 Qs

InformationSecurity030

InformationSecurity030

Assessment

Quiz

Specialty

Professional Development

Easy

Created by

Rajendren Subramaniam

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data is an Asset

True

False

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

In order to construct an effective security plan, we need to look at how important the information is and draw some lines to separate by priority and importance. This process of categorization is known as the _____.

Data Classification

Information Classification

Value Classification

Technology Classification

Security Classification

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data must be properly classified, and there must be a way to apply a static identification. We call this _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The classified data will be assigned to appropriate roles to control and manage.

This is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

If someone has no clearance and attempt to obtain it, there must be a process to obtain it. This process is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A new user or role must have specific boundaries when accessing and dealing with data. This is also defined in the classification and labeling process and then informed to the users upon granting access. They must stay in the boundaries to accept the provided AAA for the actions they perform.

AAA represents _____, _____ and _____.

Accountablity

Accessibility

Approach

Authentication

Authorization

7.

MATCH QUESTION

2 mins • 1 pt

There are some important considerations when it comes to data classification.

Disposal

Roles and permissions

Data Security

Data disposal is important as it can lead to leak information/data. There must be secure and standardized procedures.

Encryption

Data must be kept, especially for future use and upon regulatory requirements.

Data Retention

Data can be at rest, in motion or being used . Each stage must be protected.

Access privilege

Depending on the type of data, regulatory requirements, and appropriate level of protection that must be ensured.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?