AMA University Answers
Login
Register
AMA OED
Courses
IT
IT-6205A
Data and information assets mu...
Data and information assets must be confined to people who have authorized access and not disclosed to others
Confidentiality
Correct
Integrity
Authenticity
Availability
Similar IT-6205A questions
Day-to-day processes, such as threat and vulnerability management and threat management.
After the first six phases, an attacker can act to achieve the goals. These actions typically consis...
Is it true or false. Using encrypted versions of protocols when sensitive information is exchanged s...
Is it true or false. An additional risk occurs when personal information is stored in client account...
Is it true or false. Encrypting all personal information when saved on different storage media is so...
Is it true or false. Storage the minimum required data online and maximum discretion in providing th...