do not create information, instead they obtain it from another source correct answers Most
organizations ___________.
Data Retention Policy correct answers What type of policy specifies how long data is kept,
where it is kept, and what types of data are kept?
All listed choices are correct. correct answers Which of the following techniques can be used to
overcome the problem of data remanence?
protects data in motion using appliances at the perimeter of an organization's infrastructure
correct answers Network DLP ________.
data should be properly disposed of by destroying the storage media correct answers At the end
of the information life cycle
implementing and maintaining security controls for network devices, end point devices, and
software used in the enterprise correct answers The security administrator is responsible for
__________.
Protecting backups from electromechanical failures, human failures, and outright theft of backup
media correct answers Data Protection Strategies should include ______.
All listed choices are correct. correct answers Which of the following are business assets?
RAM, CPU Registers, and Memory Caches correct answers Data in Use refers to data currently
residing in ____________
memory and storage devices have been securely wiped correct answers Prior to disposal or
transfer of ownership, obsolete equipment should be inspected to ensure that ___________.
, a copy of data that is no longer in current use correct answers A data archive is __________.
anything of value or worth to an organization correct answers As asset is ___________.
compliance requirements arising from regulations and policies correct answers Information
aggregation may trigger _________.
Reproduction correct answers Which of the following is NOT a phase of the information life
cycle as defined for the CISSP exam?
All listed choices are correct. correct answers Information has which of the following properties?
Jurisdiction correct answers Data retention requirements vary by _______________.
Regular audits correct answers How should compliance with a data retention policy be
documented?
data owner correct answers Who is responsible for determining whether or not to grant access to
specific data?
internally consistent correct answers In order to remain useful, information must be
encrypted correct answers Backups and data archives should be _______ to protect
confidentiality.
taxonomy correct answers A (an) _____ is a scheme used to develop categories for labeling data
according to function, chronology, or other characteristics.