Assets and Threats: Quiz 3

Assets and Threats: Quiz 3

Professional Development

26 Qs

quiz-placeholder

Similar activities

AI-900 Day 8 Fundamentals of Machine Learning in Azure

AI-900 Day 8 Fundamentals of Machine Learning in Azure

Professional Development

24 Qs

CAP-II Part 2

CAP-II Part 2

Professional Development

21 Qs

Python basics

Python basics

Professional Development

22 Qs

Internet Technologies(Quiz 3)

Internet Technologies(Quiz 3)

Professional Development

21 Qs

Chapter 7 Quiz

Chapter 7 Quiz

Professional Development

23 Qs

IS404 - SY2023

IS404 - SY2023

Professional Development

21 Qs

Enterprise Mobility + Security

Enterprise Mobility + Security

Professional Development

24 Qs

Fortress IQ: The ISMS Quest

Fortress IQ: The ISMS Quest

Professional Development

25 Qs

Assets and Threats: Quiz 3

Assets and Threats: Quiz 3

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

26 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Security controls can be organized into three types: tec_________, ope___________, and man___________.

Technical control types include the many technologies used to protect assets. This includes encryption, authentication systems, and others.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The principle of least priv____________ is a security concept in which a user is only granted the minimum level of access and authorization required to complete a task or function.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The data lif_____________ is an important model that security teams consider when protecting information. It influences how they set policies that align with business objectives. It also plays an important role in the technologies security teams use to make information accessible.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

In general, the data lifecycle has five stages. Each describe how data flows through an organization from the moment it is created until it is no longer useful:

col______ sto______ us______ arc______ des______

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data gove_________ is a set of processes that define how an organization manages information. gove_________ often includes policies that specify how to keep data private, accurate, available, and secure throughout its lifecycle.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Effective data governance is a collaborative activity that relies on people. Data governance policies commonly categorize individuals into a specific role:

Data ow__________: the person that decides who can access, edit, use, or destroy their information.

Data cus_________: anyone or anything that's responsible for the safe handling, transport, and storage of information.

Data ste__________: the person or group that maintains and implements data governance policies set by an organization.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

p___ is any information used to infer an individual's identity. Personally identifiable information and refers to information that can be used to contact or locate someone.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?