When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements. Selected
...
When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements. Selected Answer: acce ss Correct Answer: acce ss Question 2 2 out of 2 points At Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted? Selected Answer: legal classification Correct Answer: legal classification Question 3 2 out of 2 points A risk exposure is defined as When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements. Selected Answer: acce ss Correct Answer: acce ss Question 2 2 out of 2 points At Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted? Selected Answer: legal classification Correct Answer: legal classification Question 3 2 out of 2 points A risk exposure is defined as the impact to the organization when a situation transpires. The widely accepted formula for calculating exposure is as follows: Risk exposure =________________ the event will occur + ____________ if the event occurs Selected Answer: likelihood, impact Correct Answer: likelihood, impact Question 4 2 out of 2 points One of the most important approaches used to secure personal data is ________________, which is the process used to prove the identity of an individual. ______________, however, is the process used to enable a person’s access privileges. Selected Answer: authentication, authorization Correct Answer: authentication, authorization Question 5
[Show More]