True/False
Organizations should have a data classification scheme categorizing information assets based on their sensitivity and security needs; for example: confidential,internal and public.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: As part of the risk identification process,listing
Q40: _ elements are divided into three categories:
Q41: According to Sun Tzu - knowing yourself
Q42: Determining the likelihood that vulnerable systems will
Q43: _ are specific areas in which threat
Q44: Risk Analysis is the process of discovering
Q46: The final step in the risk identification
Q47: What information signifies that a manufacturer performed
Q48: The _ community best understands threats and
Q49: Assigning a value to each information asset