Chapter 2 ■ Asset Security (Domain 2) 39
C. Purge, document, validate
D. Purge, validate, document
- What methods are often used to protect data in transit?
A. Telnet, ISDN, UDP
B. BitLocker, FileVault
C. AES, Serpent, IDEA
D. TLS, VPN, IPSec
- Which one of the following data roles bears ultimate organizational responsibility
for data?
A. System owners
B. Business owners
C. Data owners
D. Mission owners - What U.S. government agency oversees compliance with the Privacy Shield framework for
organizations wishing to use the personal data of EU citizens?
A. The FA A
B. The FDA
C. The DoD
D. The Department of Commerce
For questions 57–59, please refer to the following scenario:
Chris has recently been hired into a new organization. The organization that Chris
belongs to uses the following classification process:
- Criteria are set for classifying data.
- Data owners are established for each type of data.
- Data is classified.
- Required controls are selected for each classification.
- Baseline security standards are selected for the organization.
- Controls are scoped and tailored.
- Controls are applied and enforced.
- Access is granted and managed.