AES is not useful for securing confidential but classified material. AES is not useful for securing secret but classified material. AES is not useful for securing top secret but unclassified material. Top secret cannot be unclassified.
151. Business data classification schemes usually do
a. Private
b. Public
c. For internal use only
d. Secret
152. Data containing trade secrets is an example of which of the following data classification schemes?
a. Classified
b. Unclassified
c. Unclassified but sensitive
d. Confidential
153. Which of the following assists in complying with others?
a. Policy
b. Procedure
c. Standard
d. Guideline
154. Which of the following is referred to when at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a moderate impact value and no security objective is assigned a high impact value for an information system?
a. Low-impact system
b. Moderate-impact system
c. High-impact system
d. No-impact system
155. Which of the following security controls are needed when data is transferred from low network users to high network users?
1. Software/hardware guards
2. Automated processing
3. Automated blocking
4. Automated filtering
a. 1 and 2
b. 1 and 3
c. 2 and 3
d. 3 and 4
When data is transferred from high network users to low network users (i.e., data is regraded), software/hardware guards, automated processing, and automated filtering techniques are needed to regulate the transfer. The goal of automated processing, blocking, and filtering techniques is an attempt to eliminate or identify viruses and other malicious code transfers. The goal of software/hardware guard is to facilitate transfer of data between private and public networks.
156. Which of the following is a prerequisite to IT security training?
a. Certification
b. Education
c. Awareness
d. Training
Education integrates all the security skills and competencies of the various functional specialists and adds a multidisciplinary study of concepts, issues, and principles. Normally, organizations seldom require evidence of qualification or certification as a condition of appointment.
157. When developing information systems security policies, organizations should pay particular attention to which of the following?
a. User education