Exam 5: Asset Management and Data Loss Prevention
Exam 1: Understanding Cybersecurity Policy and Governance20 Questions
Exam 2: Cybersecurity Policy Organization, Format, and Styles20 Questions
Exam 3: Cybersecurity Framework20 Questions
Exam 4: Governance and Risk Management20 Questions
Exam 5: Asset Management and Data Loss Prevention19 Questions
Exam 6: Human Resources Security20 Questions
Exam 7: Physical and Environmental Security19 Questions
Exam 8: Communications and Operations Security19 Questions
Exam 9: Access Control Management18 Questions
Exam 10: Information Systems Acquisition, Development, and Maintenance20 Questions
Exam 11: Cybersecurity Incident Response20 Questions
Exam 12: Business Continuity Management20 Questions
Exam 13: Regulatory Compliance for Financial Institutions20 Questions
Exam 14: Regulatory Compliance for the Health-Care Sector20 Questions
Exam 15: PCI Compliance for Merchants20 Questions
Exam 16: Nist Cybersecurity Framework20 Questions
Select questions type
Which of the following statements describes reclassification?
Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
D
Which of the following refers to visible and tangible pieces of equipment and media, such as computer equipment and storage media?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
D
Which of the following is a hardware identification number that uniquely identifies a device?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
B
Which of the following would most likely be classified as confidential information under the private sector classification system?
(Multiple Choice)
4.9/5
(36)
Which of the following is not one of the classification levels for private sector information?
(Multiple Choice)
4.8/5
(40)
Which of the following is not one of the classification levels for national security information?
(Multiple Choice)
4.9/5
(37)
A Social Security number would be classified in which of the following levels under the private sector classification system?
(Multiple Choice)
4.8/5
(38)
Which of the following refers to the unauthorized or unintentional modification or destruction of information?
(Multiple Choice)
4.7/5
(43)
Which of the following is not one of the responsibilities of a data owner?
(Multiple Choice)
4.8/5
(43)
Which data type protected by DLP includes patent applications, product design documents, the source code of software, research information, and customer data?
(Multiple Choice)
4.9/5
(44)
Which of the following is designed to implement the business rules of the organization and is often custom-developed?
(Multiple Choice)
4.9/5
(32)
Which of the following refers to programs or code that provide the interface between the hardware, the users, and the data?
(Multiple Choice)
4.7/5
(37)
Which of the following best described the Bell-Lapadula security model?
(Multiple Choice)
4.8/5
(36)
Which if the following statements best describes declassification?
(Multiple Choice)
4.8/5
(33)
Which of the following informs custodians and users how to treat the information they use and the systems they interact with?
(Multiple Choice)
4.9/5
(32)
Which of the following statements best describes the Biba security model?
(Multiple Choice)
4.9/5
(45)
Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?
(Multiple Choice)
4.8/5
(37)
The objective of an __________ is to differentiate data types to enable organizations to safeguard CIA based on content.
(Multiple Choice)
4.8/5
(34)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)