Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-End users who work with the information to perform their daily jobs supporting the mission of the organization, and who therefore share the responsibility for data security.
Correct Answer:
Verified
Q18: Which threat is the most common intellectual
Q19: Organizations must minimize _ to match their
Q20: Which individual is considered to be a
Q21: The _ are the foundation of a
Q22: A(n) _ is a written statement of
Q24: Match each item with a statement below.
a.Accuracy
f.Data
Q25: A(n) _ defines the boundary between the
Q26: When organizations record versions of their policy
Q27: Match each item with a statement below.
a.Accuracy
f.Data
Q28: Match each item with a statement below.
a.Accuracy
f.Data
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents