which of the following entities is authorized to grant …
In discretionary access environments, which of the following entities is authorized to grant information access to
other people?
Which of the following is given the responsibility of t…
Which of the following is given the responsibility of the maintenance and protection of the data?
What is surreptitious transfer of information from a hi…
What is surreptitious transfer of information from a higher classification compartment to a lower classification
compartment without going through the formal communication channels?
how would salary levels and medical information be clas…
According to private sector data classification levels, how would salary levels and medical information be
classified?
Which type of attack would a competitive intelligence a…
Which type of attack would a competitive intelligence attack best classify as?
Which one of the following steps should be performed FIRST?
You have been tasked to develop an effective information classification program. Which one of the following
steps should be performed FIRST?
Which of the following would be the BEST criterion to c…
Which of the following would be the BEST criterion to consider in determining the classification of an
information asset?
Whose role is it to assign classification level to info…
Whose role is it to assign classification level to information?
Which of the following is not an approach used by KDD?
Many approaches to Knowledge Discovery in Databases (KDD) are used to identify valid and useful patterns in
data. This is an evolving field of study that includes a variety of automated analysis solutions such as Data
Mining. Which of the following is not an approach used by KDD?
what are two types of system assurance?
As per the Orange Book, what are two types of system assurance?