Chapter 2Asset Security (Domain 2)
SUBDOMAINS
- 2.1 Identify and classify information and assets
- 2.2 Establish information and asset handling requirements
- 2.3 Provision information and assets securely
- 2.4 Manage data lifecycle
- 2.5 Ensure appropriate asset retention (e.g., End of Life (EOL), End of Support)
- 2.6 Determine data security controls and compliance requirements
- Angela wants to implement data security controls that are part of the NIST 800-53 Security and Privacy controls. As part of the process, she works to determine which controls are appropriate to her organization's business processes and data handling needs. What term best describes the action that she has performed?
- Scoping
- Bounds checking
- Data stewardship
- Tailoring
Get ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.