Which of these are characteristics of an effective data security policy?下面哪一个是有效的数据安全政策的特征?:()?
(A)The policies are specific, measurable, achievable, realistic, and technology aligned政策是指定的,可度量的,可达到的,实事求是的,和技术保持联动
(B)The procedures defined are benchmarked, supported by technology, framework based, and peer reviewed对过程的定义是有基准的,由技术提供支持,基于框架的,并有同时互查支持
(C)The defined procedures are tightly defined, with rigid and effective enforcement sanctions, and alignment with technology capabilities对过程的定义是严谨的,与严格和有效的惩罚措施联动,和技术能力保持联动
(D)None of these都不对
(E)The defined procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted定义过程确定合法的用户能以正确的方式使用与更新权限,同时所有非法访问与更新将被限制 答案解析: 这题考的是书上一模一样的原话,请


更多CDMP数据治理试题
- 1Reference data is used to:参考数据用于:()?
- 2Although cloud solutions promote the ability to be mundane and opaque’, for data governance, it is necessary to understand where data is located to尽管云解决方案促进了“平凡和不透明”的能力,但对于数据治理,有必要了解数据位于何处:()?
- 3When a project specification is reviewed by the enterprise data architect, which of the following is not a consideration?当企业数据架构师审查项目规范时,以下哪一项不需要考虑?:()?
- 4Top down and bottom up data analysis and profiling is best done in concert because:自上而下和自下而上的数据分析及剖析应该一同处理,因为::()?
- 5请从下列对反规范化设计的描述中选择错误的选项
- 6Which of these are increasingly driving legislation for information security and data privacy?以下哪一项不断推动着信息安全及数据私隐的立法?:()?