Which of the following helps to apply the proper security controls to information?
A. Data classification
B. Deduplication
C. Clean desk policy
D. Encryption
Explanation:
One Comment on “Which of the following helps to apply the proper security controls to information?”
meacsays:
Another badly drafted question:
We are speaking of security control of data. All answers are a form of security control.
Now, the question should really be: Which of the following approaches can be used in order to determine the best security control to be applied to information in any given situation?
In this case, the answer is indeed “A: Data Classification.”
Depending on the classification of the data, I could then chose an appropriate security control.
Information classification is done by confidentiality levels and comprises of three categories, namely:
• Public use,
• Internal use
• And restricted use.
These categories make applying the appropriate policies and security controls practical.
Another badly drafted question:
We are speaking of security control of data. All answers are a form of security control.
Now, the question should really be: Which of the following approaches can be used in order to determine the best security control to be applied to information in any given situation?
In this case, the answer is indeed “A: Data Classification.”
Depending on the classification of the data, I could then chose an appropriate security control.
Information classification is done by confidentiality levels and comprises of three categories, namely:
• Public use,
• Internal use
• And restricted use.
These categories make applying the appropriate policies and security controls practical.
0
0