31. Why is it so challenging to secure digital information? Select two answers.

  • Most information is in the form of data.
  • There are no regulations that protect information.
  • There are so many resources to dedicate to security.
  • Technologies are interconnected.

32. What is an example of confidential information? Select two answers.

  • Press release
  • Employee contacts
  • Project documents
  • Marketing strategy

33. What is an example of data in use? Select three answers.

  • Reading emails in your inbox.
  • Watching a movie on a laptop.
  • Playing music on your phone.
  • Downloading a file attachment.

34. Which of the following are functions of the NIST Cybersecurity Framework core? Select three answers.

  • Implement
  • Protect
  • Detect
  • Respond

Leave a Reply