Question 292 out of 2 pointsThe ______________________ denotes the application software and technology that concerns a wide range of topics from the data management to the systems that process information. Question 302 out of 2 pointsWhile it would not be possible to classify all data in an organization, there has nonetheless been an increase in the amount of unstructured data retained in recent years, which has included data and logs. There are many different ways to make the time-consuming and expensive process of retaining data less challenging. Which of the following is notone these approaches? Question 312 out of 2 pointsThe term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term ______________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network.
Question 320 out of 2 pointsIf a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________. Question 330 out of 2 pointsAt Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted? Question 342 out of 2 pointsWhich of the following outcomes is one of the benefits of a risk-management approach to security policies?
Question 350 out of 2 pointsIn policies regarding the ___________ of data, it must be guaranteed that the data that exits the private network is secured and monitored; the data should also be encrypted while in transit.
You've reached the end of your free preview.
Want to read all 19 pages?
- Spring '14
- Correct Answer, Chief Information Security Officer