
InformationSecurity030
Quiz
•
Specialty
•
Professional Development
•
Practice Problem
•
Easy
Rajendren Subramaniam
Used 8+ times
FREE Resource
Enhance your content in a minute
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data is an Asset
True
False
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
In order to construct an effective security plan, we need to look at how important the information is and draw some lines to separate by priority and importance. This process of categorization is known as the _____.
Data Classification
Information Classification
Value Classification
Technology Classification
Security Classification
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data must be properly classified, and there must be a way to apply a static identification. We call this _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The classified data will be assigned to appropriate roles to control and manage.
This is called _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
If someone has no clearance and attempt to obtain it, there must be a process to obtain it. This process is called _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
6.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A new user or role must have specific boundaries when accessing and dealing with data. This is also defined in the classification and labeling process and then informed to the users upon granting access. They must stay in the boundaries to accept the provided AAA for the actions they perform.
AAA represents _____, _____ and _____.
Accountablity
Accessibility
Approach
Authentication
Authorization
7.
MATCH QUESTION
2 mins • 1 pt
There are some important considerations when it comes to data classification.
Disposal
Data can be at rest, in motion or being used . Each stage must be protected.
Encryption
Depending on the type of data, regulatory requirements, and appropriate level of protection that must be ensured.
Data Security
Data disposal is important as it can lead to leak information/data. There must be secure and standardized procedures.
Data Retention
Roles and permissions
Access privilege
Data must be kept, especially for future use and upon regulatory requirements.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
MIDTERM EXAM
Quiz
•
Professional Development
20 questions
PK TEST SPG & MD PERIODE JANUARI 2023
Quiz
•
Professional Development
20 questions
PLC Final Review
Quiz
•
Professional Development
15 questions
Football Quiz
Quiz
•
KG - Professional Dev...
20 questions
Powtórka z marketingu pod egzamin zawodowy
Quiz
•
Professional Development
15 questions
Quiz Kalibrasi Edulab
Quiz
•
Professional Development
17 questions
Gry nie koniecznie komputerowe
Quiz
•
KG - Professional Dev...
20 questions
really easy quiz
Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
