Deck 5: Asset Management and Data Loss Prevention

ملء الشاشة (f)
exit full mode
سؤال
Which of the following statements best describes the Biba security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following best described the Bell-Lapadula security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
سؤال
A Social Security number would be classified in which of the following levels under the private sector classification system?

A) Internal use
B) Protected
C) Confidential
D) Public
سؤال
Which of the following would most likely be classified as confidential information under the private sector classification system?

A) Laboratory research
B) Social Security number
C) List of upcoming trade shows
D) Nonsensitive client or vendor information
سؤال
Which of the following is not one of the classification levels for national security information?

A) Secret
B) Protected
C) Confidential
D) Unclassified
سؤال
Which of the following is not one of the classification levels for private sector information?

A) Protected
B) Secret
C) Internal use
D) Public
سؤال
Which of the following statements describes reclassification?

A) The process of changing the classification level to a lower level
B) The process of removing a classification
C) The process of assigning a classification
D) The process of upgrading a classification
سؤال
Which if the following statements best describes declassification?

A) The process of upgrading a classification
B) The process of assigning a new classification
C) The process of downgrading sensitivity levels
D) The process of removing a classification
سؤال
Which of the following is a hardware identification number that uniquely identifies a device?

A) IP domain name
B) MAC address
C) IPv4 address
D) IPv6 address
سؤال
A MAC address uses which of the following formats?

A) Hexadecimal
B) Binary
C) Decimal
D) Unicode
سؤال
Which of the following refers to the unauthorized or unintentional modification or destruction of information?

A) Loss of availability
B) Loss of confidentiality
C) Loss of control
D) Loss of integrity
سؤال
Which of the following is not one of the responsibilities of a data owner?

A) Assigning the economic or business value to the asset
B) Implementing security controls for the asset
C) Defining the level of protection required for the asset
D) Deciding who should have access to the asset
سؤال
The objective of an __________ is to differentiate data types to enable organizations to safeguard CIA based on content.

A) asset classification policy
B) information ownership policy statement
C) information classification system
D) inventory information systems
سؤال
Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?

A) High potential impact
B) Moderate potential impact
C) Low potential impact
D) No potential impact
سؤال
Which of the following informs custodians and users how to treat the information they use and the systems they interact with?

A) Processing standards
B) Handling standards
C) Organizational standards
D) Classification standards
سؤال
Which of the following refers to visible and tangible pieces of equipment and media, such as computer equipment and storage media?

A) Operating system software
B) Software assets
C) Productivity software
D) Hardware assets
سؤال
Which of the following refers to programs or code that provide the interface between the hardware, the users, and the data?

A) Software assets
B) Hardware assets
C) Infrastructure equipment
D) Printers
سؤال
Which of the following is designed to implement the business rules of the organization and is often custom-developed?

A) Productivity software
B) Operating system software
C) Application software
D) Software assets
سؤال
Which data type protected by DLP includes patent applications, product design documents, the source code of software, research information, and customer data?

A) Personally Identifiable Information (PII)
B) Intellectual Property (IP)
C) Nonpublic Information (NPI)
D) None of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Asset Management and Data Loss Prevention
1
Which of the following statements best describes the Biba security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
No read down, no write up
2
Which of the following best described the Bell-Lapadula security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
No read up, no write down
3
A Social Security number would be classified in which of the following levels under the private sector classification system?

A) Internal use
B) Protected
C) Confidential
D) Public
Protected
4
Which of the following would most likely be classified as confidential information under the private sector classification system?

A) Laboratory research
B) Social Security number
C) List of upcoming trade shows
D) Nonsensitive client or vendor information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is not one of the classification levels for national security information?

A) Secret
B) Protected
C) Confidential
D) Unclassified
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is not one of the classification levels for private sector information?

A) Protected
B) Secret
C) Internal use
D) Public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following statements describes reclassification?

A) The process of changing the classification level to a lower level
B) The process of removing a classification
C) The process of assigning a classification
D) The process of upgrading a classification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which if the following statements best describes declassification?

A) The process of upgrading a classification
B) The process of assigning a new classification
C) The process of downgrading sensitivity levels
D) The process of removing a classification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is a hardware identification number that uniquely identifies a device?

A) IP domain name
B) MAC address
C) IPv4 address
D) IPv6 address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
10
A MAC address uses which of the following formats?

A) Hexadecimal
B) Binary
C) Decimal
D) Unicode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following refers to the unauthorized or unintentional modification or destruction of information?

A) Loss of availability
B) Loss of confidentiality
C) Loss of control
D) Loss of integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is not one of the responsibilities of a data owner?

A) Assigning the economic or business value to the asset
B) Implementing security controls for the asset
C) Defining the level of protection required for the asset
D) Deciding who should have access to the asset
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
13
The objective of an __________ is to differentiate data types to enable organizations to safeguard CIA based on content.

A) asset classification policy
B) information ownership policy statement
C) information classification system
D) inventory information systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?

A) High potential impact
B) Moderate potential impact
C) Low potential impact
D) No potential impact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following informs custodians and users how to treat the information they use and the systems they interact with?

A) Processing standards
B) Handling standards
C) Organizational standards
D) Classification standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following refers to visible and tangible pieces of equipment and media, such as computer equipment and storage media?

A) Operating system software
B) Software assets
C) Productivity software
D) Hardware assets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following refers to programs or code that provide the interface between the hardware, the users, and the data?

A) Software assets
B) Hardware assets
C) Infrastructure equipment
D) Printers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is designed to implement the business rules of the organization and is often custom-developed?

A) Productivity software
B) Operating system software
C) Application software
D) Software assets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which data type protected by DLP includes patent applications, product design documents, the source code of software, research information, and customer data?

A) Personally Identifiable Information (PII)
B) Intellectual Property (IP)
C) Nonpublic Information (NPI)
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 19 في هذه المجموعة.