and Compliance – Rewritten
Examination Comprehensive
Study Guide + Exam Questions &
Solutions Graded A+
Professional Academic Assistance Services
Services Offered
• Proctored Exam Assistance
• Online Class Management (Full Course Support)
• Exam Preparation & Study Materials
• Assignments and Coursework Support
• Essay and Research Paper Writing
• Discussion Posts & Responses
• Editing and Proofreading
• Confidential Academic Consultation
Contact Information
Email:
WhatsApp link: https://wa.me/254704846336
Fast Response | Confidential | Reliable Academic
, Support
Helping Students Achieve Academic Excellence
1. A copyright ......
A. protects the right of an author to prevent viewing of his/her works.
B. protects the right of an author to prevent unauthorised use of his/her works.
C. protects information that provides a competitive advantage.
D. protects an author’s right to distribute his/her works.
Answer: B
2. The primary responsibility of information (data) owner in a typical
information security program is to ...
A. ensure the validity and accuracy of data.
B. determine the information sensitivity or classification level.
C. monitor and audit system users.
D. ensure availability of data.
Answer: B
3. ‘What is the inverse of confidentiality, integrity, and availability (C.LA.) triad
in risk management?
A. misuse, exposure, destruction
B. authorization, non-repudiation, integrity
C. disclosure, alteration, destruction
D. confidentiality, integrity, availability