Exam 5: Asset Management and Data Loss Prevention

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements describes reclassification?

Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
Verified

D

Which of the following refers to visible and tangible pieces of equipment and media, such as computer equipment and storage media?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

D

Which of the following is a hardware identification number that uniquely identifies a device?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B

A MAC address uses which of the following formats?

(Multiple Choice)
4.8/5
(41)

Which of the following would most likely be classified as confidential information under the private sector classification system?

(Multiple Choice)
4.9/5
(36)

Which of the following is not one of the classification levels for private sector information?

(Multiple Choice)
4.8/5
(40)

Which of the following is not one of the classification levels for national security information?

(Multiple Choice)
4.9/5
(37)

A Social Security number would be classified in which of the following levels under the private sector classification system?

(Multiple Choice)
4.8/5
(38)

Which of the following refers to the unauthorized or unintentional modification or destruction of information?

(Multiple Choice)
4.7/5
(43)

Which of the following is not one of the responsibilities of a data owner?

(Multiple Choice)
4.8/5
(43)

Which data type protected by DLP includes patent applications, product design documents, the source code of software, research information, and customer data?

(Multiple Choice)
4.9/5
(44)

Which of the following is designed to implement the business rules of the organization and is often custom-developed?

(Multiple Choice)
4.9/5
(32)

Which of the following refers to programs or code that provide the interface between the hardware, the users, and the data?

(Multiple Choice)
4.7/5
(37)

Which of the following best described the Bell-Lapadula security model?

(Multiple Choice)
4.8/5
(36)

Which if the following statements best describes declassification?

(Multiple Choice)
4.8/5
(33)

Which of the following informs custodians and users how to treat the information they use and the systems they interact with?

(Multiple Choice)
4.9/5
(32)

Which of the following statements best describes the Biba security model?

(Multiple Choice)
4.9/5
(45)

Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?

(Multiple Choice)
4.8/5
(37)

The objective of an __________ is to differentiate data types to enable organizations to safeguard CIA based on content.

(Multiple Choice)
4.8/5
(34)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)