No description available
Data Security Controls
Protecting Data at Rest
Data Ownership and Custodianship
Data Management Principles
Protecting Data in Transit
Try a quiz in Data Management FOR FREE!
Start Skill Test
Data Management is a part of:
Access Control Attacks
Access Control Effectiveness
Access Control Fundamentals
ABC Inc. is concerned with the leakage of data from the company by employees bringing in unapproved USB drives and making copies of sensitive information. Which of these controls would help mitigate the risk in this scenario?
Which of the following are examples of data that may need to be protected while at rest?
What types of data classification are used in private organizations (Pick three)
When systems are cleared of their data content, this process is called data remanence.
Having security personnel that administer access control functions, but do not administer audit functions is an example of:
Residual data that remains beyond non-invasive methods to delete it is known as ___.
Which information classification when compromised, could cause exceptionally grave damage to national security?
What type of policy determines the amount of time that logs are kept on an archive?
The 'web of trust' concept is used by which technology?
Data classification helps to protect data based on sensitivity or confidentiality. All of these are benefits of using a data classification systems EXCEPT?