
InformationSecurity030

Quiz
•
Specialty
•
Professional Development
•
Easy
Rajendren Subramaniam
Used 8+ times
FREE Resource
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data is an Asset
True
False
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
In order to construct an effective security plan, we need to look at how important the information is and draw some lines to separate by priority and importance. This process of categorization is known as the _____.
Data Classification
Information Classification
Value Classification
Technology Classification
Security Classification
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data must be properly classified, and there must be a way to apply a static identification. We call this _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The classified data will be assigned to appropriate roles to control and manage.
This is called _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
If someone has no clearance and attempt to obtain it, there must be a process to obtain it. This process is called _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
6.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A new user or role must have specific boundaries when accessing and dealing with data. This is also defined in the classification and labeling process and then informed to the users upon granting access. They must stay in the boundaries to accept the provided AAA for the actions they perform.
AAA represents _____, _____ and _____.
Accountablity
Accessibility
Approach
Authentication
Authorization
7.
MATCH QUESTION
2 mins • 1 pt
There are some important considerations when it comes to data classification.
Encryption
Data disposal is important as it can lead to leak information/data. There must be secure and standardized procedures.
Access privilege
Data must be kept, especially for future use and upon regulatory requirements.
Data Security
Roles and permissions
Disposal
Data can be at rest, in motion or being used . Each stage must be protected.
Data Retention
Depending on the type of data, regulatory requirements, and appropriate level of protection that must be ensured.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Maritime Glossary 6 - OHM

Quiz
•
Professional Development
17 questions
Autism

Quiz
•
University - Professi...
15 questions
POST TEST CV - SE Panduan Survey

Quiz
•
Professional Development
15 questions
Fundamental of Common Rail Diesel Fuel System

Quiz
•
University - Professi...
20 questions
Pre-Test Basic Lingkungan 2023

Quiz
•
Professional Development
15 questions
Mission Prep v2

Quiz
•
Professional Development
18 questions
MOD 9 OBJ 3A

Quiz
•
Professional Development
20 questions
Traditional dishes

Quiz
•
10th Grade - Professi...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade