Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
practice questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Data in movement is commonly
Correct
Information in movement is commonly Information in movement is characterized by organizing or off-host transmission. The RESTful protocol, whereas relating to a subset of information on a organize, isn’t as great a reply as being transmitted over the arrange.
Incorrect
Information in movement is commonly Information in movement is characterized by organizing or off-host transmission. The RESTful protocol, whereas relating to a subset of information on a organize, isn’t as great a reply as being transmitted over the arrange.
-
Question 2 of 10
2. Question
Data in use is commonly
Correct
Registers are utilized as it were whereas information is being utilized by the CPU, so when information is an inhabitant in registers, it is, by definition, in utilize.
Incorrect
Registers are utilized as it were whereas information is being utilized by the CPU, so when information is an inhabitant in registers, it is, by definition, in utilize.
-
Question 3 of 10
3. Question
Who has the primary responsibility of determining the classification level for data?
Correct
A company can have one particular information proprietor or distinctive information proprietors who have been delegated the obligation of securing particular sets of information. One of the responsibilities that goes into ensuring this data is legitimately classifying it.
Incorrect
A company can have one particular information proprietor or distinctive information proprietors who have been delegated the obligation of securing particular sets of information. One of the responsibilities that goes into ensuring this data is legitimately classifying it.
-
Question 4 of 10
4. Question
In case different user groups with different security get to levels that need to access the same information, which of the following activities should management take?
Correct
On the off chance that information is getting to be accessible to a wide run of individuals, more granular security should be actualized to ensure that as it were the essential individuals get to the information which the operations they carry out are controlled. The security actualized can come within the shape of authentication and authorization innovations, encryption, and particular get-to-control mechanisms.
Incorrect
On the off chance that information is getting to be accessible to a wide run of individuals, more granular security should be actualized to ensure that as it were the essential individuals get to the information which the operations they carry out are controlled. The security actualized can come within the shape of authentication and authorization innovations, encryption, and particular get-to-control mechanisms.
-
Question 5 of 10
5. Question
What should the administration consider the most when classifying information?
Correct
Accessibility, astuteness, and privacy are the best answer since to appropriately classify information, the information owner must assess the accessibility, astuteness, and privacy prerequisites of the information. Once this assessment is done, it’ll direct which representatives, temporary workers, and clients can access the information, which is communicated in reply A. This evaluation will moreover offer assistance to decide the controls that ought to be put into put.
Incorrect
Accessibility, astuteness, and privacy are the best answer since to appropriately classify information, the information owner must assess the accessibility, astuteness, and privacy prerequisites of the information. Once this assessment is done, it’ll direct which representatives, temporary workers, and clients can access the information, which is communicated in reply A. This evaluation will moreover offer assistance to decide the controls that ought to be put into put.
-
Question 6 of 10
6. Question
Who is ultimately dependable for making sure information is classified and protected?
Correct
The key to this address is the utilize of the word “ultimately.” In spite of the fact that the administration can delegate assignments to others, it is eventually capable of everything that takes put inside a company. Hence, it must ceaselessly guarantee that information and assets are being properly protected.
Incorrect
The key to this address is the utilize of the word “ultimately.” In spite of the fact that the administration can delegate assignments to others, it is eventually capable of everything that takes put inside a company. Hence, it must ceaselessly guarantee that information and assets are being properly protected.
-
Question 7 of 10
7. Question
Which of the following requirements should the information maintenance policy address?
Correct
The information maintenance arrangement ought to take after the laws of any locale inside which the organization’s information dwells. It must so also comply with any administrative requirements. Finally, the arrangement must address the organization’s operational requirements.
Incorrect
The information maintenance arrangement ought to take after the laws of any locale inside which the organization’s information dwells. It must so also comply with any administrative requirements. Finally, the arrangement must address the organization’s operational requirements.
-
Question 8 of 10
8. Question
Which of the following isn’t addressed by the data retention policy?
Correct
The information maintenance arrangement ought to address what information to keep, where to keep it, how to store it, and for how long to keep it. The arrangement isn’t concerned with “for whom” the data is kept.
Incorrect
The information maintenance arrangement ought to address what information to keep, where to keep it, how to store it, and for how long to keep it. The arrangement isn’t concerned with “for whom” the data is kept.
-
Question 9 of 10
9. Question
Which of the following best describes an application of cryptography to ensure data at rest?
Correct
Information at rest is best secured utilizing whole-disk encryption on the client workstations or mobile computers. None of the other choices apply to information at rest.
Incorrect
Information at rest is best secured utilizing whole-disk encryption on the client workstations or mobile computers. None of the other choices apply to information at rest.
-
Question 10 of 10
10. Question
Which of the following best depicts an application of cryptography to ensure it the data in motion?
Correct
Information in movement is best secured by arranging encryption arrangements such as TLS, VPN, or IPSec. None of the other alternatives apply to information in movement.
Incorrect
Information in movement is best secured by arranging encryption arrangements such as TLS, VPN, or IPSec. None of the other alternatives apply to information in movement.