A(n) _________ is a formal access control methodology used to assign a level of
confidentiality to an information asset and thus restrict the number of people who can access it.

A. security clearance scheme
B. data recovery scheme
C. risk management scheme
D. data classification scheme


Answer: D

Computer Science & Information Technology

You might also like to view...

Subtractive primary colors are:

a. purple, mauve, blue b. yellow, brown, green c. cyan, magenta, gray d. magenta, cyan, yellow e. yellow, cyan, purple

Computer Science & Information Technology

The default Quick Click category is the ____ category.

A. blue B. red C. green D. purple

Computer Science & Information Technology

RAD compresses all but the investigation and operation/maintenance stages of the SDLC

a. true b. false

Computer Science & Information Technology

Give two examples of employee fraud and explain how the theft might occur.

What will be an ideal response?

Computer Science & Information Technology