Multiple Choice
Based on sensitivity, assets are classified as
A) Essential, required, deferrable
B) Restricted, unrestricted
C) Information, personnel, hardware
D) Hardware, software, legal
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Software assets are<br>A) Software tools needed to
Q2: The majority of information security incidents are
Q3: An example of a top-down approach to
Q4: Hardware assets are<br>A) Software tools needed to
Q6: Asset criticality is usually associated with the
Q7: The stages in an IT asset life
Q8: Bottom-up and top down approaches are needed
Q9: RFPs, ITNs, ITBs are associated with the<br>A)
Q10: Methods of hardware asset discovery include<br>A) Network
Q11: Required assets are those whose loss of