31. Why is it so challenging to secure digital information? Select two answers.
- Most information is in the form of data.
- There are no regulations that protect information.
- There are so many resources to dedicate to security.
- Technologies are interconnected.
32. What is an example of confidential information? Select two answers.
- Press release
- Employee contacts
- Project documents
- Marketing strategy
33. What is an example of data in use? Select three answers.
- Reading emails in your inbox.
- Watching a movie on a laptop.
- Playing music on your phone.
- Downloading a file attachment.
34. Which of the following are functions of the NIST Cybersecurity Framework core? Select three answers.
- Implement
- Protect
- Detect
- Respond