nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #253

CERTIFIED-IN-CYBERSECURITY Question #253: Real Exam Question with Answer & Explanation

The correct answer is A: Destruction phase. The final phase of the data handling life cycle is destruction (see ISC2 Study Guide, Module 1, under Data Handling Life Cycle). This phase involves securely destroying data that is no longer needed or has reached the end of its useful life. The creation phase is the first phase

Security Principles

Question

What is the final phase of the data handling life cycle?

Options

  • ADestruction phase
  • BCreation phase
  • CModification phase
  • DSharing phase

Explanation

The final phase of the data handling life cycle is destruction (see ISC2 Study Guide, Module 1, under Data Handling Life Cycle). This phase involves securely destroying data that is no longer needed or has reached the end of its useful life. The creation phase is the first phase of the data handling life cycle and involves creating and collecting data. The modification phase is the second phase of the data handling life cycle and consists in modifying and updating data. The sharing phase is the third phase of the data handling life cycle and involves sharing data with authorized parties.

Topics

#Data lifecycle#Data handling#Data destruction#Information security

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions