100%(18)18 out of 18 people found this document helpful
This preview shows page 2 - 4 out of 4 pages.
0 out of 1 pointsA data classification scheme is a formal access control methodology used to assign a level of availability to an information asset and thus restrict the number of people who can access it.Selected Answer:TrueAnswers:TrueFalseQuestion 61 out of 1 pointsA(n) disaster recoveryplan includes the steps necessary to ensure the continuation of the organization when a disaster’s scope or scale exceeds the ability of the organization to restore operations, usually through relocation of critical business functions to an alternate location. _________________________Selected Answer:FalseAnswers:TrueFalseQuestion 70 out of 1 pointsWhen organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.Selected Answer:c. best practicesAnswers:a. benchmarkingb. baseliningc. best practicesd. standards of due careQuestion 80 out of 1 pointsThe __________ plan specifies the actions an organization can and should take while an adverseevent (that could result in loss of an information asset or assets, but does not currently
threaten the viability of the entire organization) is in progress.