InformationSecurity030

InformationSecurity030

Professional Development

18 Qs

quiz-placeholder

Similar activities

Clinical Numeracy for Registered Nurses

Clinical Numeracy for Registered Nurses

Professional Development

15 Qs

GVA QUIZ 1

GVA QUIZ 1

Professional Development

15 Qs

Autism

Autism

University - Professional Development

17 Qs

POST TEST CV -  SE Panduan Survey

POST TEST CV - SE Panduan Survey

Professional Development

15 Qs

Fundamental of Common Rail Diesel Fuel System

Fundamental of Common Rail Diesel Fuel System

University - Professional Development

15 Qs

Leadership/ Delegation

Leadership/ Delegation

University - Professional Development

20 Qs

Hopkins Pool Rules

Hopkins Pool Rules

Professional Development

13 Qs

Pre-Test Basic Lingkungan 2023

Pre-Test Basic Lingkungan 2023

Professional Development

20 Qs

InformationSecurity030

InformationSecurity030

Assessment

Quiz

Specialty

Professional Development

Easy

Created by

Rajendren Subramaniam

Used 8+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data is an Asset

True

False

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

In order to construct an effective security plan, we need to look at how important the information is and draw some lines to separate by priority and importance. This process of categorization is known as the _____.

Data Classification

Information Classification

Value Classification

Technology Classification

Security Classification

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data must be properly classified, and there must be a way to apply a static identification. We call this _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The classified data will be assigned to appropriate roles to control and manage.

This is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

If someone has no clearance and attempt to obtain it, there must be a process to obtain it. This process is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A new user or role must have specific boundaries when accessing and dealing with data. This is also defined in the classification and labeling process and then informed to the users upon granting access. They must stay in the boundaries to accept the provided AAA for the actions they perform.

AAA represents _____, _____ and _____.

Accountablity

Accessibility

Approach

Authentication

Authorization

7.

MATCH QUESTION

2 mins • 1 pt

There are some important considerations when it comes to data classification.

Encryption

Data disposal is important as it can lead to leak information/data. There must be secure and standardized procedures.

Access privilege

Data must be kept, especially for future use and upon regulatory requirements.

Data Security

Roles and permissions

Disposal

Data can be at rest, in motion or being used . Each stage must be protected.

Data Retention

Depending on the type of data, regulatory requirements, and appropriate level of protection that must be ensured.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?