
Assets and Threats: Quiz 3

Quiz
•
Computers
•
Professional Development
•
Hard
John Coder
FREE Resource
26 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Security controls can be organized into three types: tec_________, ope___________, and man___________.
Technical control types include the many technologies used to protect assets. This includes encryption, authentication systems, and others.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The principle of least priv____________ is a security concept in which a user is only granted the minimum level of access and authorization required to complete a task or function.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The data lif_____________ is an important model that security teams consider when protecting information. It influences how they set policies that align with business objectives. It also plays an important role in the technologies security teams use to make information accessible.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
In general, the data lifecycle has five stages. Each describe how data flows through an organization from the moment it is created until it is no longer useful:
col______ sto______ us______ arc______ des______
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Data gove_________ is a set of processes that define how an organization manages information. gove_________ often includes policies that specify how to keep data private, accurate, available, and secure throughout its lifecycle.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Effective data governance is a collaborative activity that relies on people. Data governance policies commonly categorize individuals into a specific role:
Data ow__________: the person that decides who can access, edit, use, or destroy their information.
Data cus_________: anyone or anything that's responsible for the safe handling, transport, and storage of information.
Data ste__________: the person or group that maintains and implements data governance policies set by an organization.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
p___ is any information used to infer an individual's identity. Personally identifiable information and refers to information that can be used to contact or locate someone.
Create a free account and access millions of resources
Similar Resources on Wayground
23 questions
A+ - 18C - Troubleshoot Mobile OS and App Security

Quiz
•
Professional Development
28 questions
A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Quiz
•
Professional Development
24 questions
A+ - 17A - Managing Security Settings

Quiz
•
Professional Development
21 questions
A+ - 19C - Explain Data Handling Best Practices

Quiz
•
Professional Development
25 questions
NETWORKS

Quiz
•
Professional Development
21 questions
Chapter 11 - Digital Applications

Quiz
•
Professional Development
30 questions
Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Quiz
•
Professional Development
21 questions
A+ - 19A -

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade