Which of these are characteristics of an effective data security policy?下面哪一个是有效的数据安全政策的特征?:()?
(A)The policies are specific, measurable, achievable, realistic, and technology aligned政策是指定的,可度量的,可达到的,实事求是的,和技术保持联动
(B)The procedures defined are benchmarked, supported by technology, framework based, and peer reviewed对过程的定义是有基准的,由技术提供支持,基于框架的,并有同时互查支持
(C)The defined procedures are tightly defined, with rigid and effective enforcement sanctions, and alignment with technology capabilities对过程的定义是严谨的,与严格和有效的惩罚措施联动,和技术能力保持联动
(D)None of these都不对
(E)The defined procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted定义过程确定合法的用户能以正确的方式使用与更新权限,同时所有非法访问与更新将被限制 答案解析: 这题考的是书上一模一样的原话,请


更多CDMP数据治理试题
- 1You are engaged in a consulting position to advice a company on how best to understand how its data is used in the company by its applications as a best approach, you would recommend如果您从事咨询工作,就如何最好地了解其应用程序如何在公司中使用其数据向公司提供建议,您会推荐最佳方法:()?
- 2以下哪项不是通常建模的数据类型
- 3An application uses a single service account for all database access.One of the risks of this approach is:应用程序对所有数据库访问使用单个服务帐户。这种方法的风险之一是::()?
- 4数据库使用代码表中的外键作为列值,这是哪种概念的实现方式:(单选题)
- 5数据治理活动是确保数据治理落地实施的重要举措,数据治理活动包括现状评估及规划、战略制定、落地实施、嵌入及持续运营等四个方面内容,请从下列选项中选择关于嵌入及持续运营描述不正确的选项
- 6Which of these statements best defines Data Security Management?下面的各项描述中,哪个较好地定义了数据安全管理?:()?