下载此文档

安全管理习题讲解PPT教案.pptx


文档分类:办公文档 | 页数:约60页 举报非法文档有奖
1/60
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/60 下载此文档
文档列表 文档介绍
1
会计学
安全管理****题讲解
QUIZ
2 According to governmental data classification levels, how would answers to tests and health care information be classified?
A Confidential
B Sensitive but unclassified
C Private
D Unclassified
B
QUIZ
3. According to private sector data classification levels, how would salary levels and medical information be classified?
A Confidential
B Public
C Private
D Sensitive
C
QUIZ
4 Which of the next are steps of a common development process of creating a security policy, standards and procedures?
A design, development, publication, coding, testing
B design, evaluation, approval, publication, implementation
C initial and evaluation, development, approval, publication, implementation, maintenance
D feasibility, development, approval, implementation, integration
C
5 What is the main purpose of a security policy?
A to transfer the responsibility for the information security to all users of the organization
B to provide detailed steps for performing specific actions
C to provide a common framework for all development activities
D to provide the management direction and support for information security
D
6 Which of the following department managers would be best suited to oversee the development of an information security policy?
A Security administration
B Human resources
C Business operations
D Information systems
C
7 Which of the following is not a responsibility of an information owner?
A Running regular backups and periodically testing the validity of the backup data.
B Delegate the responsibility of data protection to data custodians.
C Periodically review the classification assignments against business needs.
D Determine what level of classification the information requires.
A
8 Which of the following is not a goal of integrity?
A Prevention of the modification of information by unauthorized users.
B Prevention of the unauthorized or unintentional modification of information by authorized users.
C

安全管理习题讲解PPT教案 来自淘豆网www.taodocs.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数60
  • 收藏数0 收藏
  • 顶次数0
  • 上传人wz_198613
  • 文件大小277 KB
  • 时间2021-05-11