No description available
Data Security Controls
Protecting Data at Rest
Data Ownership and Custodianship
Data Management Principles
Protecting Data in Transit
Try a quiz in Data Management FOR FREE!
Start Skill Test
Data Management is a part of:
Access Control Attacks
Access Control Effectiveness
Access Control Fundamentals
What is called the act of psychological manipulation of people into performing actions or divulging confidential information?
What element must not be discussed with end users in regards to email retention policies?
Which of the following is a primary benefit of labeling the data?
Commercial data is often classified by three of these classification schemes and typically protect information that has monetary values. Which of these is NOT a classification scheme of commercial data?
Which of the following are not used for protecting data at rest (Confidentiality)?
_________ is the primary means by which data is protected based on its need for confidentiality, sensitivity or secrecy.
Which information classification when compromised, could cause damage to national security?
A ___________ identifies blocks of memory that were allocated but are no longer used, it deallocates the blocks and marks them as free.
The 'web of trust' concept is used by which technology?
Which of the following are examples where data may need to be protected while in transit?