
Assets and Threats: Quiz 3
Authored by John Coder
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Security controls can be organized into three types: tec_________, ope___________, and man___________.
Technical control types include the many technologies used to protect assets. This includes encryption, authentication systems, and others.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The principle of least priv____________ is a security concept in which a user is only granted the minimum level of access and authorization required to complete a task or function.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The data lif_____________ is an important model that security teams consider when protecting information. It influences how they set policies that align with business objectives. It also plays an important role in the technologies security teams use to make information accessible.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
In general, the data lifecycle has five stages. Each describe how data flows through an organization from the moment it is created until it is no longer useful:
col______ sto______ us______ arc______ des______
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Data gove_________ is a set of processes that define how an organization manages information. gove_________ often includes policies that specify how to keep data private, accurate, available, and secure throughout its lifecycle.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Effective data governance is a collaborative activity that relies on people. Data governance policies commonly categorize individuals into a specific role:
Data ow__________: the person that decides who can access, edit, use, or destroy their information.
Data cus_________: anyone or anything that's responsible for the safe handling, transport, and storage of information.
Data ste__________: the person or group that maintains and implements data governance policies set by an organization.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
p___ is any information used to infer an individual's identity. Personally identifiable information and refers to information that can be used to contact or locate someone.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?