Question 11
Four types of Data Classification (Choose two)
Question 12
A hacker gains access to a webserver and can view a file on the server containing credit card numbers.
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
Question 13
Who is authorized to change the classification of a document?
Question 14
How is the purpose of information security policy best described?
Question 15
Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?