
InformationSecurity030

Quiz
•
Specialty
•
Professional Development
•
Easy
Rajendren Subramaniam
Used 8+ times
FREE Resource
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data is an Asset
True
False
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
In order to construct an effective security plan, we need to look at how important the information is and draw some lines to separate by priority and importance. This process of categorization is known as the _____.
Data Classification
Information Classification
Value Classification
Technology Classification
Security Classification
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data must be properly classified, and there must be a way to apply a static identification. We call this _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The classified data will be assigned to appropriate roles to control and manage.
This is called _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
If someone has no clearance and attempt to obtain it, there must be a process to obtain it. This process is called _____.
Labeling
Access Approval
Clearance
Authentication
Authorization
6.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A new user or role must have specific boundaries when accessing and dealing with data. This is also defined in the classification and labeling process and then informed to the users upon granting access. They must stay in the boundaries to accept the provided AAA for the actions they perform.
AAA represents _____, _____ and _____.
Accountablity
Accessibility
Approach
Authentication
Authorization
7.
MATCH QUESTION
2 mins • 1 pt
There are some important considerations when it comes to data classification.
Disposal
Data must be kept, especially for future use and upon regulatory requirements.
Data Security
Data disposal is important as it can lead to leak information/data. There must be secure and standardized procedures.
Data Retention
Data can be at rest, in motion or being used . Each stage must be protected.
Encryption
Roles and permissions
Access privilege
Depending on the type of data, regulatory requirements, and appropriate level of protection that must be ensured.
Create a free account and access millions of resources
Similar Resources on Wayground
18 questions
Business Ethics for Managers

Quiz
•
University - Professi...
21 questions
AAT L2 Costing 04 Behaviour Fixed, Variable & High Low Method

Quiz
•
Professional Development
23 questions
Milady Chapter 19

Quiz
•
Professional Development
17 questions
Innovation & Entrepreneurship

Quiz
•
University - Professi...
17 questions
Order of Draw

Quiz
•
Professional Development
16 questions
Criminal Minds

Quiz
•
KG - Professional Dev...
20 questions
Trick Questions

Quiz
•
3rd Grade - Professio...
20 questions
Planets, Houses and Signs Quiz 1

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade