nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #428

CERTIFIED-IN-CYBERSECURITY Question #428: Real Exam Question with Answer & Explanation

The correct answer is C: Create, Store, Use, Share, Archive, Destroy. The six components of the data lifecycle are create, store, use, share, archive, and destroy (see ISC2 Study Guide, Chapter 5, Module 1). For example, when a document is created in an organization, it is stored in a secure location. The document is used for its intended purpose a

Security Principles

Question

What are the six components in the data lifecycle?

Options

  • ACreate, Save, Use, Share, Archive, Destroy
  • BCreate, Store, Use, Share, Archive, Delete
  • CCreate, Store, Use, Share, Archive, Destroy
  • DCreate, Store, Utilize, Share, Archive, Destroy

Explanation

The six components of the data lifecycle are create, store, use, share, archive, and destroy (see ISC2 Study Guide, Chapter 5, Module 1). For example, when a document is created in an organization, it is stored in a secure location. The document is used for its intended purpose and may be shared with others who need access to it. When the document is no longer in active use, it is archived for possible future reference. Finally, when the document is no longer needed, even for archival purposes, it is securely destroyed. The other options relate to unrecognized components of the data lifecycle. In particular, 'Save' is not a recognized stage in the data lifecycle; the correct term would be 'Store', which refers to the secure storage of data. Then 'Delete' is also not a recognized stage in the data lifecycle; the correct term would be 'destroy', which refers to the secure and permanent disposal of data. Finally, 'Utilize' is not a recognized stage in the data lifecycle; the correct term would be 'Use', which refers to the active use of data for its intended purpose.

Topics

#Data Lifecycle#Data Management#Information Security#Data Protection

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions