InformationSecurity030

InformationSecurity030

Professional Development

18 Qs

quiz-placeholder

Similar activities

DTW Quiz 1

DTW Quiz 1

Professional Development

16 Qs

Stacks

Stacks

KG - Professional Development

17 Qs

Aspen Capital Cost Estimator

Aspen Capital Cost Estimator

Professional Development

23 Qs

Utah Educational Leadership Standard #3

Utah Educational Leadership Standard #3

Professional Development

18 Qs

SAKA Technology Sharing Day-2

SAKA Technology Sharing Day-2

Professional Development

14 Qs

Health and Safety 1

Health and Safety 1

Professional Development

14 Qs

SQL quizz

SQL quizz

Professional Development

13 Qs

Digital Marathon 5/7: HANA Pop Quiz!

Digital Marathon 5/7: HANA Pop Quiz!

Professional Development

15 Qs

InformationSecurity030

InformationSecurity030

Assessment

Quiz

Specialty

Professional Development

Easy

Created by

Rajendren Subramaniam

Used 8+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data is an Asset

True

False

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

In order to construct an effective security plan, we need to look at how important the information is and draw some lines to separate by priority and importance. This process of categorization is known as the _____.

Data Classification

Information Classification

Value Classification

Technology Classification

Security Classification

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data must be properly classified, and there must be a way to apply a static identification. We call this _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The classified data will be assigned to appropriate roles to control and manage.

This is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

If someone has no clearance and attempt to obtain it, there must be a process to obtain it. This process is called _____.

Labeling

Access Approval

Clearance

Authentication

Authorization

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A new user or role must have specific boundaries when accessing and dealing with data. This is also defined in the classification and labeling process and then informed to the users upon granting access. They must stay in the boundaries to accept the provided AAA for the actions they perform.

AAA represents _____, _____ and _____.

Accountablity

Accessibility

Approach

Authentication

Authorization

7.

MATCH QUESTION

2 mins • 1 pt

There are some important considerations when it comes to data classification.

Disposal

Data must be kept, especially for future use and upon regulatory requirements.

Data Security

Data disposal is important as it can lead to leak information/data. There must be secure and standardized procedures.

Data Retention

Data can be at rest, in motion or being used . Each stage must be protected.

Encryption

Roles and permissions

Access privilege

Depending on the type of data, regulatory requirements, and appropriate level of protection that must be ensured.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?