Question 11

Four types of Data Classification (Choose two)
  • Question 12

    A hacker gains access to a webserver and can view a file on the server containing credit card numbers.
    Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
  • Question 13

    Who is authorized to change the classification of a document?
  • Question 14

    How is the purpose of information security policy best described?
  • Question 15

    Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?