Deck 5: Asset Management and Data Loss Prevention

Full screen (f)
exit full mode
Question
Which of the following statements best describes the Biba security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following best described the Bell-Lapadula security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
Question
A Social Security number would be classified in which of the following levels under the private sector classification system?

A) Internal use
B) Protected
C) Confidential
D) Public
Question
Which of the following would most likely be classified as confidential information under the private sector classification system?

A) Laboratory research
B) Social Security number
C) List of upcoming trade shows
D) Nonsensitive client or vendor information
Question
Which of the following is not one of the classification levels for national security information?

A) Secret
B) Protected
C) Confidential
D) Unclassified
Question
Which of the following is not one of the classification levels for private sector information?

A) Protected
B) Secret
C) Internal use
D) Public
Question
Which of the following statements describes reclassification?

A) The process of changing the classification level to a lower level
B) The process of removing a classification
C) The process of assigning a classification
D) The process of upgrading a classification
Question
Which if the following statements best describes declassification?

A) The process of upgrading a classification
B) The process of assigning a new classification
C) The process of downgrading sensitivity levels
D) The process of removing a classification
Question
Which of the following is a hardware identification number that uniquely identifies a device?

A) IP domain name
B) MAC address
C) IPv4 address
D) IPv6 address
Question
A MAC address uses which of the following formats?

A) Hexadecimal
B) Binary
C) Decimal
D) Unicode
Question
Which of the following refers to the unauthorized or unintentional modification or destruction of information?

A) Loss of availability
B) Loss of confidentiality
C) Loss of control
D) Loss of integrity
Question
Which of the following is not one of the responsibilities of a data owner?

A) Assigning the economic or business value to the asset
B) Implementing security controls for the asset
C) Defining the level of protection required for the asset
D) Deciding who should have access to the asset
Question
The objective of an __________ is to differentiate data types to enable organizations to safeguard CIA based on content.

A) asset classification policy
B) information ownership policy statement
C) information classification system
D) inventory information systems
Question
Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?

A) High potential impact
B) Moderate potential impact
C) Low potential impact
D) No potential impact
Question
Which of the following informs custodians and users how to treat the information they use and the systems they interact with?

A) Processing standards
B) Handling standards
C) Organizational standards
D) Classification standards
Question
Which of the following refers to visible and tangible pieces of equipment and media, such as computer equipment and storage media?

A) Operating system software
B) Software assets
C) Productivity software
D) Hardware assets
Question
Which of the following refers to programs or code that provide the interface between the hardware, the users, and the data?

A) Software assets
B) Hardware assets
C) Infrastructure equipment
D) Printers
Question
Which of the following is designed to implement the business rules of the organization and is often custom-developed?

A) Productivity software
B) Operating system software
C) Application software
D) Software assets
Question
Which data type protected by DLP includes patent applications, product design documents, the source code of software, research information, and customer data?

A) Personally Identifiable Information (PII)
B) Intellectual Property (IP)
C) Nonpublic Information (NPI)
D) None of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Asset Management and Data Loss Prevention
1
Which of the following statements best describes the Biba security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
No read down, no write up
2
Which of the following best described the Bell-Lapadula security model?

A) No read up, no write up
B) No write up, no write down
C) No read up, no write down
D) No read down, no write up
No read up, no write down
3
A Social Security number would be classified in which of the following levels under the private sector classification system?

A) Internal use
B) Protected
C) Confidential
D) Public
Protected
4
Which of the following would most likely be classified as confidential information under the private sector classification system?

A) Laboratory research
B) Social Security number
C) List of upcoming trade shows
D) Nonsensitive client or vendor information
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not one of the classification levels for national security information?

A) Secret
B) Protected
C) Confidential
D) Unclassified
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is not one of the classification levels for private sector information?

A) Protected
B) Secret
C) Internal use
D) Public
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following statements describes reclassification?

A) The process of changing the classification level to a lower level
B) The process of removing a classification
C) The process of assigning a classification
D) The process of upgrading a classification
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
Which if the following statements best describes declassification?

A) The process of upgrading a classification
B) The process of assigning a new classification
C) The process of downgrading sensitivity levels
D) The process of removing a classification
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is a hardware identification number that uniquely identifies a device?

A) IP domain name
B) MAC address
C) IPv4 address
D) IPv6 address
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
A MAC address uses which of the following formats?

A) Hexadecimal
B) Binary
C) Decimal
D) Unicode
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following refers to the unauthorized or unintentional modification or destruction of information?

A) Loss of availability
B) Loss of confidentiality
C) Loss of control
D) Loss of integrity
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is not one of the responsibilities of a data owner?

A) Assigning the economic or business value to the asset
B) Implementing security controls for the asset
C) Defining the level of protection required for the asset
D) Deciding who should have access to the asset
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
The objective of an __________ is to differentiate data types to enable organizations to safeguard CIA based on content.

A) asset classification policy
B) information ownership policy statement
C) information classification system
D) inventory information systems
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following means the loss of CIA could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals?

A) High potential impact
B) Moderate potential impact
C) Low potential impact
D) No potential impact
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following informs custodians and users how to treat the information they use and the systems they interact with?

A) Processing standards
B) Handling standards
C) Organizational standards
D) Classification standards
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following refers to visible and tangible pieces of equipment and media, such as computer equipment and storage media?

A) Operating system software
B) Software assets
C) Productivity software
D) Hardware assets
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following refers to programs or code that provide the interface between the hardware, the users, and the data?

A) Software assets
B) Hardware assets
C) Infrastructure equipment
D) Printers
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is designed to implement the business rules of the organization and is often custom-developed?

A) Productivity software
B) Operating system software
C) Application software
D) Software assets
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
Which data type protected by DLP includes patent applications, product design documents, the source code of software, research information, and customer data?

A) Personally Identifiable Information (PII)
B) Intellectual Property (IP)
C) Nonpublic Information (NPI)
D) None of the above
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.