A(n) _________ is a formal access control methodology used to assign a level of
confidentiality to an information asset and thus restrict the number of people who can access it.
A. security clearance scheme
B. data recovery scheme
C. risk management scheme
D. data classification scheme
Answer: D
Computer Science & Information Technology
You might also like to view...
Subtractive primary colors are:
a. purple, mauve, blue b. yellow, brown, green c. cyan, magenta, gray d. magenta, cyan, yellow e. yellow, cyan, purple
Computer Science & Information Technology
The default Quick Click category is the ____ category.
A. blue B. red C. green D. purple
Computer Science & Information Technology
RAD compresses all but the investigation and operation/maintenance stages of the SDLC
a. true b. false
Computer Science & Information Technology
Give two examples of employee fraud and explain how the theft might occur.
What will be an ideal response?
Computer Science & Information Technology