True/False
A formal access control methodology used to assign a level ofconfidentiality to an information asset and thus restrict the number of people who can access it is known as a data categorization scheme.____________
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q42: What should the prioritized list of assets
Q43: Having an established risk management program means
Q44: Which of the following is an example
Q45: Assigns a risk-rating ranked value to each
Q46: List the stages in the risk identification
Q48: Classification categories must be mutually exclusive and
Q49: Remains even after current control has been
Q50: For the purposes of relative risk assessment
Q51: An evaluation of the threats to information
Q52: Labels that must be comprehensive and mutually