Deck 2: Assets

Full screen (f)
exit full mode
Question
Data classification is used to help companies gauge the amount of funds and resources that should go towards protecting types of data. When setting up classification systems, what steps are included?

A)Indicate procedures for declassifying the data
B)Define classification levels
C)Document any exceptions to the previous classification issues
D)All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Sandy told a friend who works for one of your competitors how many people work at the company and upcoming projects. What type of classification is being discussed?

A)Sensitive
B)Private
C)Public
D)Unclassified
Question
What are considered "critical records"? Select all that apply.

A)Any record that contains confidential, secure company information
B)Any record that contains personal information
C)Any record that would cause considerable inconvenience if lost or destroyed
D)Any record that would be expensive to replace
Question
Who decides upon the classification of data and is responsible for any negligent act that results in the corruption or disclosure of the data?

A)Data Custodian
B)Data Owner
C)Audit Committee
D)Security Administrator
Question
What concept is defined as clearing of any residual information from a hard drive, USB drive, or tape?

A)Object Formatting
B)Object Reuse
C)Reuse Formatting
D)Formatting
Question
Last week I deleted some information, yet there seems to be some left. What is this?

A)Degaussing
B)Zeroization
C)Data Remanence
D)Ghost
Question
Green has determined that his company needs countermeasures and safeguards to prevent any threats that may hurt his company and its growth. When determining what attributes the selected safeguard mechanism should have, he determines that good ones include:

A)Asset Protection
B)Testability
C)A and B
D)Neither A nor B
Question
Marcus and Mary have made an agreement that results in a consistent reference point. What was created?

A)Baselines
B)Standards
C)Expectations
D)Regulations
Question
Mike is a snooping employee who doesn't wish to be caught. What technique would he use to avoid his snooping detection?

A)Deletion
B)Avoidance Deletion
C)Deterrence Scrubbing
D)Scrubbing
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Assets
1
Data classification is used to help companies gauge the amount of funds and resources that should go towards protecting types of data. When setting up classification systems, what steps are included?

A)Indicate procedures for declassifying the data
B)Define classification levels
C)Document any exceptions to the previous classification issues
D)All of the above
All of the above
2
Sandy told a friend who works for one of your competitors how many people work at the company and upcoming projects. What type of classification is being discussed?

A)Sensitive
B)Private
C)Public
D)Unclassified
Public
3
What are considered "critical records"? Select all that apply.

A)Any record that contains confidential, secure company information
B)Any record that contains personal information
C)Any record that would cause considerable inconvenience if lost or destroyed
D)Any record that would be expensive to replace
Any record that would cause considerable inconvenience if lost or destroyed
Any record that would be expensive to replace
4
Who decides upon the classification of data and is responsible for any negligent act that results in the corruption or disclosure of the data?

A)Data Custodian
B)Data Owner
C)Audit Committee
D)Security Administrator
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
What concept is defined as clearing of any residual information from a hard drive, USB drive, or tape?

A)Object Formatting
B)Object Reuse
C)Reuse Formatting
D)Formatting
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
Last week I deleted some information, yet there seems to be some left. What is this?

A)Degaussing
B)Zeroization
C)Data Remanence
D)Ghost
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
Green has determined that his company needs countermeasures and safeguards to prevent any threats that may hurt his company and its growth. When determining what attributes the selected safeguard mechanism should have, he determines that good ones include:

A)Asset Protection
B)Testability
C)A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
Marcus and Mary have made an agreement that results in a consistent reference point. What was created?

A)Baselines
B)Standards
C)Expectations
D)Regulations
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
Mike is a snooping employee who doesn't wish to be caught. What technique would he use to avoid his snooping detection?

A)Deletion
B)Avoidance Deletion
C)Deterrence Scrubbing
D)Scrubbing
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 9 flashcards in this deck.