While it would not be possible to classify all data

This preview shows page 15 - 18 out of 21 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Management of Information Security
The document you are viewing contains questions related to this textbook.
Chapter 3 / Exercise 6
Management of Information Security
Mattord/Whitman
Expert Verified
QUESTION 341.While it would not be possible to classify all data in an organization, there has nonetheless been an increase in the amount of unstructured data retained in recent years, which has included data and logs. There are many different ways to make the time-consuming and expensive process of retaining data less challenging. Which of the following is notone these approaches?A.Classify only the data that is most vital and contains the highest risk to the organization.B.Classify data by point of origin or storage location.C.Classify data at use or time of inception.D.Classify all forms of data no matter the risk to the organization.
QUESTION 351.If an organization is creating a customized data classification scheme, it is important to keep in mind the accepted guidelines. Which of the following is notone these guidelines?
QUESTION 361.An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations.
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Management of Information Security
The document you are viewing contains questions related to this textbook.
Chapter 3 / Exercise 6
Management of Information Security
Mattord/Whitman
Expert Verified
QUESTION 371.The initial step in creating a business continuity and security response plan is a _________________, which can be used to assemble the business and security responses in order to diminish losses.
QUESTION 381.In information security, the individual responsible for setting goals for implementing security policies is the _________________.chief information security officerA.B.SupervisorC.human resources manager
D.executive manager
QUESTION 391.What is the main difference between a law and a regulation?
QUESTION 401.It is important that security policies establish a concrete distinction between work life and home life. Such a distinction requires that employees understand that they have no expectation of _______________.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture